AS-301a · Module 3

Post-Incident Analysis

3 min read

The incident is over. The compromised credential has been rotated, the affected agent has been restored, and the stakeholders have been notified. Now comes the most important part: figuring out why it happened and making sure it does not happen again. Post-incident analysis — sometimes called a retrospective or a post-mortem — is the process that turns an expensive failure into organizational learning. Without it, you pay the cost of the incident and get nothing in return.

The blameless post-mortem is not optional — it is a structural requirement. If the analysis focuses on "who made the mistake," people will hide mistakes. If it focuses on "what systemic condition allowed this mistake to cause an incident," people will share information freely. The distinction matters because the root cause of most security incidents is not a person making a bad decision. It is a system that allowed a bad decision to have a disproportionate impact. The person is the proximate cause. The system is the root cause. Fix the system.

  1. Timeline Reconstruction Build a minute-by-minute timeline of the incident from detection through resolution. What happened, when, and what was the response at each stage. The timeline reveals gaps — periods where the incident was active but undetected, or detected but not acted upon.
  2. Root Cause Analysis Ask "why" five times. The credential was compromised — why? It was stored in a configuration file — why? The team did not have a secret manager configured — why? The deployment process did not include a credential security check — why? There was no security checklist in the deployment pipeline — why? The fifth "why" usually reveals the systemic gap.
  3. Improvement Actions Define specific, measurable, assignable actions that address the root cause. "Improve security" is not an action. "Add automated credential scanning to the CI/CD pipeline by March 15, owned by the platform team" is an action. Every action has an owner, a deadline, and a verification method.