⚠ INCIDENT ACTIVE — THREAT ACTOR CONFIRMED ON NETWORK — RESPONSE REQUIRED ⚠
⬤ BREACH DETECTED — THREAT ACTOR ACTIVE

Command the
Incident Response.
Before It's Too Late.

A sophisticated threat actor has breached the network perimeter.
Turn-based cyber defense built on the frameworks you work with every day.

iOS 18.0+  ·  ARIA on-device AI on iOS 26+  ·  No ads  ·  No subscriptions  ·  Free demo

OPERATION: SILENT WARD · TURN 4 OF 18 · NIST 800-61 PHASE: CONTAINMENT
■ THREAT Email Gateway → Staff Workstations [COMPROMISED]
▲ EVIDENCE MEDIUM · 5 IOC confirmed · Attribution not yet supportable
● HONEYPOT deployed on File Server — attacker approaching

ARIA: "Lateral movement pattern consistent with credential
       harvesting pre-objective. Patient DB is two hops out, Commander."

AP: ▣▣□    TRUST: 78%    CONTINUITY: 91%
> _
800-61
NIST IR Guide
8
Commander Actions
51
Field Operations
Adaptive Threat Paths

Built on real incident response frameworks.

Every mechanic in Zero Day Command maps to a phase, decision, or concept from the frameworks your team actually uses. This is not a marketing claim — here is the mapping.

Game Mechanic Framework Reference
SCAN TRACE
NIST SP 800-61 Phase 2 — Detection & Analysis. Identifying indicators of compromise, building the event timeline, raising evidence confidence before escalating.
ISOLATE PATCH
NIST SP 800-61 Phase 3 — Containment. Severing lateral movement paths, reducing attack surface, applying short-term and long-term containment strategies.
RESTORE NODE RESTORE LINK
NIST SP 800-61 Phase 4 — Eradication & Recovery. Restoring compromised systems from backup and reconnecting severed network segments. Risk is higher at LOW evidence — real recovery requires confirmed containment first.
PUBLIC NOTICE
NIST CSF 2.0 — RS.CO · GDPR Art. 33 · SEC 4-day rule — Response Communications. Disclosure timing is mandatory after a breach under real law — too early without evidence damages credibility, too late triggers regulatory penalties. Both cost trust. The game enforces the same asymmetry.
HONEYPOT
MITRE ATT&CK — Deception — Active deception countermeasures. Contact generates high-confidence indicators and pins attacker position — the same logic behind real deception networks.
AFTER-ACTION REPORT
NIST SP 800-61 Phase 5 — Post-Incident Activity. Kill chain reconstruction, commander assessment against optimal IR practice, lessons-learned brief. Every session ends with a formal post-mortem.
THREAT ACTOR AI
MITRE ATT&CK Threat Modeling — The Adaptive Threat Engine models stealth preference, urgency, and target value independently. Tactics shift across Initial Access → Lateral Movement → Exfiltration as the mission progresses.
CompTIA CySA+
CS0-003

Domain 4 (Incident Response) and Domain 2 (Vulnerability Management) are the most directly simulated. Detection, containment decisions, and evidence discipline are core to both the cert and the game.

GIAC GCIH
Incident Handler

The most direct certification alignment. PICERL phases, evidence handling, kill chain analysis, and the post-incident lessons-learned brief all appear explicitly in Zero Day Command gameplay.

CISSP
Domain 7 — Security Operations

Incident response management, evidence collection, monitoring, and business continuity (the Continuity resource) map to Domain 7 concepts. A useful reinforcement alongside exam study.

NIST CSF 2.0
Govern · Detect · Respond

The Detect and Respond functions are the mechanical spine of the game. Public trust and communications (RS.CO), evidence quality for attribution (RS.AN), and recovery (RC.RP) all have direct in-game counterparts.

Zero Day Command is not affiliated with, endorsed by, or certified by CompTIA, GIAC/SANS, ISC², or NIST. Framework alignment is based on the game designer's own mapping of mechanics to publicly available framework documentation.

Four phases. One objective. The IR lifecycle — one turn at a time.

Every turn cycles through four phases that map to the 800-61 process. The threat advances whether you're ready or not.

PHASE 01
Intel
New indicators surface. The board updates. Passive detection phase — read before you spend Action Points.
800-61: Detection & Analysis
PHASE 02
Analysis
ARIA reads the board state and delivers intelligence. She observes — never prescribes. Your call.
PICERL: Identification
PHASE 03
Action
Spend your Action Points. Scan, isolate, deceive, restore, communicate — every choice has a cost and a second-order consequence.
800-61: Containment / Recovery
PHASE 04
Resolution
The Adaptive Threat Engine moves. It learns your defensive patterns. What worked last turn may not work next.
ATT&CK: Threat Actor Progression

Three metrics. All fragile. All real.

Every decision affects at least one. These aren't game points — they model the actual tensions an IR commander manages under pressure.

TRUST

Public Trust

Falls when the attack is visible and you stay silent. Rises when you communicate with evidence. Issue a public notice without HIGH evidence and you lose credibility. Wait too long and you lose the public. ↳ NIST CSF RS.CO

CONT.

Continuity

Reflects operational health across all systems. Compromised nodes drain it. Isolation costs it. Restoration recovers it. Hit zero and critical operations halt. ↳ NIST CSF RC.RP / Business Continuity

EVID.

Evidence Quality

Determines what actions are safe and what statements are credible. Scanning builds it. Acting without it is guesswork. Attributing without HIGH evidence is a liability. ↳ NIST 800-61 Phase 2 / RS.AN

Eight tools. Limited time. Recognisable decisions.

Each action costs Action Points. You never have enough. Every one maps to something in your playbook.

SCAN Reveal hidden indicators · builds Evidence Quality · 1 AP  / Detection & Analysis
TRACE Retrospective forensic analysis · high evidence gain · 1 AP  / Forensics / DFIR
ISOLATE Sever a lateral movement path permanently · costs Continuity · 1 AP  / Containment
PATCH Reduce attack surface on a node · 2 AP  / Vulnerability Management
HONEYPOT Deploy deception asset · auto-detects on contact · 2 AP  / Active Deception
RESTORE NODE Recover a compromised system from backup · risk at LOW evidence · 2 AP  / Eradication & Recovery
RESTORE LINK Reconnect a severed network route · risk if endpoints still compromised · 1 AP  / Network Recovery
NOTICE Issue public statement · Trust delta depends on Evidence Quality · 1 AP  / External Communications

ARIA is watching the board.

ARIA ONLINE · ON-DEVICE · ZERO TELEMETRY

AI Response Intelligence Advisor

ARIA is your embedded incident analyst. She observes the board state every turn and delivers real-time intelligence in incident-response language — reading threat patterns, flagging evidence gaps, and calling out exposure risks.

She never tells you what to do. The decisions — and their consequences — are yours.

After the mission, ARIA generates a full post-mortem: kill chain reconstruction, commander assessment, and an optimal response playbook. The learning happens in the debrief.

"Threat actor contact with honeypot asset confirmed. Attacker is positionally fixed in the Workstation Cluster. Evidence Quality is HIGH. Attribution is now supportable, Commander."
iOS 26+ · Full ARIA
Live on-device inference via Apple Foundation Models. Structured output using @Generable. ARIA reads the actual game state and generates contextual intelligence every turn. Follow-up questions in the debrief are answered live.
iOS 18–25 · Curated Library
A scenario-specific handcrafted advisory library. Full gameplay maintained — ARIA is present and relevant across all missions, all phases.

All inference is on-device. No game state leaves your phone. Ever.

The attacker learns. No two incidents resolve identically.

The threat actor isn't scripted. It models stealth preference, urgency, and target value independently each turn — and adapts to your defensive patterns. Isolate the same route twice and it probes for alternatives. Just like a real adversary would.

MITRE ATT&CK Aligned

Full kill chain progression

The threat actor moves through Initial Access → Execution → Lateral Movement → Collection → Exfiltration. Stealth, persistence, and urgency are modelled as independent variables that shift as the engagement develops.

Pattern Adaptation

It watches what you do

The engine tracks your defensive habits across turns. Heavy isolation triggers route exploration. Heavy scanning triggers stealth escalation. Reactive defenders get punished for patterns — the same dynamic SOC teams face against persistent threat actors.

Deterministic Replay

Replayable. Analysable. Teachable.

Powered by a seeded xorshift64 RNG. Every attacker decision is fully reproducible — replay uses the same seed so the After-Action Report can show you exactly where the outcome turned on a specific choice.

The learning is in the debrief.

When the mission ends — win or lose — ARIA generates a full post-mortem. Not a score screen. A structured report that maps every decision to real IR practice.

Incident Reconstruction

What happened and when

A turn-by-turn reconstruction of the attacker's movement, your responses, and the key decision points where the outcome was shaped. The pivot turn — the single moment that determined everything — is explicitly identified.

Commander Assessment

Strengths and mistakes

ARIA scores your decisions against optimal IR practice — evidence discipline before action, communication timing, isolation sequencing, containment-vs-continuity tradeoffs. The same dimensions tested in CySA+ and GCIH.

Security Intel Brief

Frameworks. Not flavour text.

Each debrief maps what just happened to real incident response concepts — NIST SP 800-61 phases, the ATT&CK kill chain, evidence handling standards, and the external communications playbook. The brief treats you like a practitioner, not a student.

  • Kill chain reconstruction — Initial Access through Exfiltration
  • Evidence quality discipline — attribution confidence at every decision point
  • Containment vs. continuity tradeoff analysis
  • System restoration assessment — was recovery sequenced correctly?
  • Public communication timing and trust impact
  • Regulatory assessment — GDPR Art. 33, SEC 4-day rule, NIS2 obligations explained
  • Optimal response playbook — what the correct sequence was
  • Framework reference brief — NIST SP 800-61, CSF 2.0, PICERL, ATT&CK
NIST SP 800-61 Rev. 3
NIST CSF 2.0
MITRE ATT&CK
PICERL
ISO/IEC 27035
RS.AN · RS.CO · RC.RP

Built for people who've written an incident response plan — and know how quickly it falls apart.

🎯

SOC Analysts & IR Practitioners

Every mechanic is something you'd recognise from a real engagement — lateral movement triage, evidence before action, the cost of staying silent too long. Validate your instincts against a system that will punish the wrong ones.

📋

CySA+ & GCIH Candidates

The containment decisions, evidence discipline, and post-incident analysis are core to both certifications. Zero Day Command won't replace study — but it will make the concepts intuitive rather than abstract.

🏫

Security Educators & Teams

A zero-setup tabletop substitute. No infrastructure. No budget. Fully offline. Hand it to a new analyst before their first tabletop exercise and watch what they learn about prioritisation and communication timing.

Built to fit how you actually play.

Native iOS features — no extra accounts, no third-party services, no friction.

Game Center

Leaderboards & achievements

Compete on global leaderboards for operations cleared, daily streak, and credit bank. Earn achievements for gold ratings, veteran operations, and long streaks. Opt in at first launch — optional, never required.

iCloud Sync

Progress across all your devices

Credits, streaks, and completed operations sync seamlessly via iCloud Key-Value Storage. Conflict resolution always favours progress — your highest score wins across devices. No account needed beyond your Apple ID.

Training Mode

Real-time coaching for every decision

Pre-action warnings explain the risk before you commit. Post-action coaching explains the real IR principle behind what just happened. Designed for new players — switch it off when you're ready to operate independently.

Share Results

Share your after-action score

A native iOS share sheet on every result screen lets you share your score card — rating, metrics, turns used — to any app. Straightforward, no screenshots required.

Field Operations

51 procedurally generated scenarios

Beyond the 15-mission campaign, Field Operations offers 51 procedurally generated incidents at five difficulty tiers — Apprentice through Veteran. Every op uses a seeded RNG so results are fully replayable and comparable.

Daily Incident

One incident. Every day.

A rotating daily operation with a shared seed — every player worldwide faces the same incident. Builds streak and credits. Designed to be completable in a single commute.

Serious engineering. No compromises.

Swift 6.0 · Strict Concurrency

No shortcuts in the codebase

Written in Swift 6 with full strict concurrency enforcement. @MainActor @Observable game engine. actor ARIASystem for fully isolated Foundation Models calls. No third-party frameworks.

SwiftUI · Canvas API

Native iOS rendering

The mission board is rendered with SwiftUI's Canvas API. Every node, route, and indicator is drawn natively. No game engines, no Unity, no Godot — pure iOS.

Privacy First · Zero Telemetry

Nothing leaves your device

No analytics. No tracking. No account. No crash reporting. All AI inference runs entirely on-device via Apple Foundation Models. The app has no network entitlements beyond StoreKit and iCloud. Your game state is yours.

⬤ THE CLOCK IS RUNNING

Ready to take command?

Tutorial and Mission 1 are free. Full game is a one-time purchase — no subscription, no ads, no account.

Join Public Beta on TestFlight

iOS 18.0+ required  ·  Best on iOS 26+ with ARIA  ·  iPad supported