Post-Incident ReviewP2~240 min

Insider-Control Lifecycle Review

Translate the investigation findings into specific control improvements: separation of duties, least-privilege enforcement, JML (joiner-mover-leaver) lifecycle, offboarding hardening, DLP coverage, consumer-cloud-sync detection, and UEBA rule tuning.

Actions

  1. 1

    Review how the subject obtained or retained the access that enabled the incident: over-permission, delayed role change, inherited permissions, stale group membership, shared service accounts.

  2. 2

    Review offboarding/transition hygiene for the subject specifically: was access review timely on role change? Would tighter controls have caught the behavior earlier?

  3. 3

    Review DLP and consumer-cloud-sync detection coverage specific to the exfiltration channels used; identify the rule or policy that was missing.

  4. 4

    Tune UEBA rules based on the deviation signals that were present but did not alert. Avoid over-tuning; false-positive fatigue kills UEBA programs.

  5. 5

    Update insider-threat tabletop scenarios with the specifics of this case (redacted) for future exercises.

Queries

Which specific control, if it had existed or been properly configured, would have detected or prevented this incident earliest?
What is the gap in JML lifecycle timing that contributed, and who owns closing that gap?

Notes

Insider control improvements often generalize beyond the specific case; invest in program-level fixes, not one-off controls.

Update tabletop exercises with real (redacted) scenarios to keep them grounded; fictional scenarios routinely miss the patterns real incidents follow.

Where to Go Next

Related Resources