13.14 Lessons Learned

2–3 hours · Module 13

Lessons Learned

The formal post-incident review. Every incident should produce a lessons learned document that answers: what went well, what could be improved, and what specific actions will be taken.

What went well

  • Detection time: 23 minutes from email delivery to first alert (ZAP verdict change). Within expected parameters for a novel AiTM URL.
  • Containment time: 8 minutes from triage start to full containment. Pre-built investigation queries and a clear playbook enabled rapid response.
  • Campaign tracking: Detection maturity improved from reactive (Wave 1) to preventive (Waves 4-5) within 48 hours.
  • Zero successful replays in Waves 2-5. Each wave was detected and contained before any credential replay occurred.
  • Cross-product correlation: Defender XDR correctly correlated the phishing email alert with the suspicious sign-in alert into a single incident.

What could be improved

  • 23-minute detection gap. ZAP removed the email from 4 mailboxes, but 19 were accessible for 23 minutes. During this window, 7 users clicked and 5 reached the proxy page. Faster URL detonation or Safe Links block mode (instead of warn mode) would reduce this window.
  • No device compliance requirement. The conditional access gap that allowed the token replay was known but not addressed before the incident. The gap existed for 6 months on the security roadmap without implementation.
  • MFA method. Authenticator app push is vulnerable to AiTM. FIDO2 deployment had been deprioritised due to hardware cost.
  • User behaviour. 5 of 7 users who saw the Safe Links warning clicked through anyway. Security awareness training on Safe Links warnings was not part of the regular training programme.

Improvement actions

ActionOwnerDeadlineStatus
Deploy device compliance CA policy for Exchange/SharePointSecurity teamDeployed during incidentComplete
Block legacy authenticationSecurity teamDeployed during incidentComplete
FIDO2 Phase 1 (admins)IT + Security2 weeksIn progress
FIDO2 Phase 2 (executives + finance)IT + Security6 weeksProcurement
Safe Links: evaluate block mode vs warn modeSecurity team4 weeksPlanned
Targeted phishing awareness training (finance)HR + Security4 weeksPlanned
Quarterly phishing simulation programmeSecurity team8 weeksPlanned
Review and close all overdue security roadmap itemsCISO2 weeksPlanned
The most important lesson

The conditional access gap that allowed this attack was known for 6 months. It was on the security roadmap. It was not implemented because it was not prioritised. This incident cost 40+ hours of analyst time, a regulatory assessment, management reporting, and emergency hardware procurement. The configuration change took 15 minutes. Known gaps that are not remediated are not gaps — they are accepted risks. Make sure someone is explicitly accepting them.

Check your understanding

1. The device compliance policy had been on the security roadmap for 6 months but was not implemented. What organisational change would prevent this from happening again?

Hire more security staff
Implement all recommendations immediately
Require explicit risk acceptance from the CISO or CTO for any security roadmap item that is overdue by more than 90 days. This creates accountability — someone must sign off on the decision to delay, rather than items silently ageing on a backlog.