12.10 Scope Assessment: Who Else Was Hit?
Scope Assessment: Who Else Was Hit?
Containment and eradication addressed the known compromised accounts. Scope assessment determines the full blast radius of the campaign — every user who was targeted, every account that may be compromised, and every data store that may have been accessed.
Comprehensive scope query
| |
Output: A table showing every user’s exposure level. Users marked COMPROMISED need the full containment and eradication workflow (11.7-11.8) if not already completed. Users marked CLICKED need sign-in log investigation (11.5) to determine if they entered credentials. Users marked TARGETED need awareness notification.
Data exposure assessment
For each compromised account, quantify the data exposure:
| |
Compliance mapping: NIST CSF RS.AN-2 (The impact of the incident is understood). The email count and user roles determine whether data breach notification is required. If the compromised accounts had access to PII, financial data, or health information, the organisation may have regulatory notification obligations (UK GDPR: 72-hour notification to ICO if personal data breach likely risks individuals’ rights).
Subsection artifact: The scope assessment query and data exposure query. These feed directly into the IR report (11.11) scope section.
Knowledge check
Data breach notification assessment
The scope assessment determines whether data breach notification is required under applicable regulations.
UK GDPR (Data Protection Act 2018): Notification to the ICO is required within 72 hours if the breach is likely to result in a risk to the rights and freedoms of individuals. Assess: did the attacker access emails containing personal data (employee PII, customer data, health information, financial data)? If yes: the 72-hour clock starts when you confirmed the breach — not when you completed the investigation.
Assessment framework:
| |
If the compromised user (a Finance Manager in this case) regularly receives emails containing financial PII, and the attacker accessed 340 emails from that mailbox: the probability that personal data was exposed is high. This triggers the 72-hour notification requirement.
Document the notification decision: “Assessment: attacker accessed 340 emails from j.morrison (Finance Manager) over 3 hours. j.morrison regularly handles payroll and vendor payment data containing employee bank details. Risk assessment: likely risk to individuals’ rights and freedoms. Recommendation: notify ICO within 72 hours. Legal counsel consulted at [time].”
Try it yourself
For the Northgate Engineering scenario with 3 compromised users (j.morrison — Finance Manager, s.chen — IT Administrator, a.patel — Accounts Payable Clerk): assess each user's likely email content based on their role. Which users' mailbox access is most likely to trigger data breach notification? Draft a one-paragraph notification assessment for each user. This exercise builds the skill of translating technical findings into regulatory compliance decisions.
What you should produce
j.morrison (Finance Manager): high probability of personal data exposure — payroll, vendor bank details. Notification likely required. s.chen (IT Administrator): moderate probability — may contain system credentials, employee device information. Assess further. a.patel (Accounts Payable): high probability — vendor financial data, potentially employee expense claims. Notification likely required.
Check your understanding
1. The scope query shows 12 users with status "CLICKED" but only 3 with status "COMPROMISED." Should you investigate the other 9 clickers?