CG
SkillsConducting Post Incident Lessons Learned
Start Free
Back to Skills Library
Incident Response🟡 Intermediate

Conducting Post Incident Lessons Learned

Facilitate structured post-incident reviews to identify root causes, document what worked and failed, and produce actionable recommendations to improve future incident response.

4 min read6 code examples

Prerequisites

  • Incident fully resolved (containment, eradication, recovery complete)
  • Incident timeline and documentation gathered
  • All incident responders available for review session
  • Meeting space for collaborative discussion
  • Incident ticketing system data for metrics analysis

Conducting Post-Incident Lessons Learned

When to Use

  • After any security incident has been fully resolved and recovery completed
  • Following tabletop exercises or IR simulations
  • After significant near-miss events
  • Quarterly review of accumulated incident trends
  • When IR playbooks need updating based on real-world experience

Prerequisites

  • Incident fully resolved (containment, eradication, recovery complete)
  • Incident timeline and documentation gathered
  • All incident responders available for review session
  • Meeting space for collaborative discussion
  • Incident ticketing system data for metrics analysis

Workflow

Step 1: Gather Incident Data

# Export incident timeline from ticketing system
curl -s "https://thehive.local/api/v1/case/$CASE_ID/timeline" \
  -H "Authorization: Bearer $THEHIVE_API_KEY" | jq '.' > incident_timeline.json

# Extract detection and response metrics from SIEM
index=notable incident_id="IR-2024-042"
| stats min(_time) as first_alert, max(_time) as last_alert,
  count as total_alerts, dc(src) as unique_sources

# Compile all responder actions and timestamps
grep -E "timestamp|action|analyst" /var/log/ir/IR-2024-042/*.json | \
  python3 -m json.tool > compiled_actions.json

Step 2: Conduct Blameless Post-Mortem Meeting

Structured Agenda (90 minutes):
1. Incident summary (5 min) - Factual overview
2. Timeline walkthrough (20 min) - Chronological events
3. What worked well (15 min) - Positive outcomes
4. What needs improvement (15 min) - Gaps and failures
5. Root cause analysis (15 min) - 5 Whys or fishbone
6. Action items (10 min) - Specific improvements with owners
7. Playbook updates (10 min) - Changes to IR procedures

Blameless Principles:
- Focus on systems and processes, not individuals
- Assume best intentions with available information
- Seek to understand, not to blame

Step 3: Perform Root Cause Analysis

# 5 Whys analysis example:
# Why 1: Why did ransomware encrypt production servers?
#   Answer: Attacker had domain admin credentials
# Why 2: Why did attacker have domain admin credentials?
#   Answer: Kerberoasted a service account and cracked it
# Why 3: Why was the service account password crackable?
#   Answer: Used a 12-character dictionary-based password
# Why 4: Why was the service account password weak?
#   Answer: No enforcement of service account password policy
# Why 5: Why was there no service account password policy?
#   Answer: PAM was not implemented for service accounts
# ROOT CAUSE: Lack of privileged access management

Step 4: Calculate Response Metrics

from datetime import datetime
events = {
    'compromise': '2024-01-10 14:00:00',
    'detection': '2024-01-15 08:30:00',
    'triage': '2024-01-15 08:45:00',
    'containment': '2024-01-15 09:30:00',
    'eradication': '2024-01-16 14:00:00',
    'recovery': '2024-01-18 16:00:00',
    'closure': '2024-01-25 10:00:00',
}
fmt = '%Y-%m-%d %H:%M:%S'
times = {k: datetime.strptime(v, fmt) for k, v in events.items()}
print(f"Dwell Time: {times['detection'] - times['compromise']}")
print(f"MTTD: {times['triage'] - times['detection']}")
print(f"MTTC: {times['containment'] - times['detection']}")
print(f"MTTR: {times['recovery'] - times['eradication']}")
print(f"Total Duration: {times['closure'] - times['detection']}")

Step 5: Document Findings and Create Action Items

# Create tracked action items in project management
curl -X POST "https://jira.local/rest/api/2/issue" \
  -H "Authorization: Bearer $JIRA_TOKEN" \
  -H "Content-Type: application/json" \
  -d '{
    "fields": {
      "project": {"key": "SEC"},
      "summary": "Implement PAM for service accounts (IR-2024-042)",
      "issuetype": {"name": "Task"},
      "priority": {"name": "High"},
      "assignee": {"name": "security_engineer"},
      "duedate": "2024-03-15"
    }
  }'

Step 6: Update Playbooks and Detection Rules

# New Sigma detection rule based on incident learnings
title: Kerberoasting Activity Detected
status: stable
description: Detects Kerberoasting based on IR-2024-042 lessons
logsource:
  product: windows
  service: security
detection:
  selection:
    EventID: 4769
    TicketEncryptionType: '0x17'
  condition: selection
level: high
tags:
  - attack.credential_access
  - attack.t1558.003

Key Concepts

ConceptDescription
Blameless Post-MortemReviewing incidents focusing on systems, not blaming individuals
Root Cause AnalysisIdentifying the fundamental reason the incident occurred
5 WhysIterative questioning technique to find root cause
MTTDMean Time to Detect - time from compromise to detection
MTTCMean Time to Contain - time from detection to containment
MTTRMean Time to Recover - time from eradication to full recovery
Continuous ImprovementIterating on IR processes based on real incident data

Tools & Systems

ToolPurpose
TheHive/ServiceNowIncident timeline and documentation
Jira/Azure DevOpsAction item tracking
Confluence/SharePointLessons learned documentation
Splunk/ElasticIncident metrics and detection improvement
SigmaDetection rule development

Common Scenarios

  1. Ransomware Post-Mortem: Review entire kill chain from initial access to encryption. Identify detection gaps and backup failures.
  2. Phishing Campaign Review: Analyze why users clicked, why email filters missed it, and how to improve training.
  3. Cloud Misconfiguration Incident: Review IaC pipeline, CSPM coverage, and change management process.
  4. Insider Threat Review: Examine DLP effectiveness, access control gaps, and user monitoring capabilities.
  5. Third-Party Breach Impact: Review vendor risk assessment process and data sharing agreements.

Output Format

  • Post-incident review meeting minutes
  • Root cause analysis document
  • Incident metrics report (MTTD, MTTC, MTTR)
  • Action items list with owners and deadlines
  • Updated IR playbooks and detection rules
  • Executive summary for leadership

Verification Criteria

Confirm successful execution by validating:

  • [ ] All prerequisite tools and access requirements are satisfied
  • [ ] Each workflow step completed without errors
  • [ ] Output matches expected format and contains expected data
  • [ ] No security warnings or misconfigurations detected
  • [ ] Results are documented and evidence is preserved for audit

Compliance Framework Mapping

This skill supports compliance evidence collection across multiple frameworks:

  • SOC 2: CC7.3 (Incident Identification), CC7.4 (Incident Response), CC7.5 (Recovery)
  • ISO 27001: A.16.1 (Security Incident Management)
  • NIST 800-53: IR-1 through IR-10 (Incident Response Family)
  • NIST CSF: RS.RP (Response Planning), RS.CO (Communications), RC.RP (Recovery Planning)

Claw GRC Tip: When this skill is executed by a registered agent, compliance evidence is automatically captured and mapped to the relevant controls in your active frameworks.

Deploying This Skill with Claw GRC

Agent Execution

Register this skill with your Claw GRC agent for automated execution:

# Install via CLI
npx claw-grc skills add conducting-post-incident-lessons-learned

# Or load dynamically via MCP
grc.load_skill("conducting-post-incident-lessons-learned")

Audit Trail Integration

When executed through Claw GRC, every step of this skill generates tamper-evident audit records:

  • SHA-256 chain hashing ensures no step can be modified after execution
  • Evidence artifacts (configs, scan results, logs) are automatically attached to relevant controls
  • Trust score impact — successful execution increases your agent's trust score

Continuous Compliance

Schedule this skill for recurring execution to maintain continuous compliance posture. Claw GRC monitors for drift and alerts when re-execution is needed.

Use with Claw GRC Agents

This skill is fully compatible with Claw GRC's autonomous agent system. Deploy it to any registered agent via MCP, and every execution will be logged in the tamper-evident audit trail.

// Load this skill in your agent
npx claw-grc skills add conducting-post-incident-lessons-learned
// Or via MCP
grc.load_skill("conducting-post-incident-lessons-learned")

Tags

incident-responselessons-learnedpost-incidentafter-action-reviewprocess-improvement

Related Skills

Incident Response

Collecting Volatile Evidence from Compromised Host

5m·intermediate
Incident Response

Eradicating Malware from Infected Systems

4m·intermediate
Incident Response

Performing Ransomware Incident Response

4m·intermediate
Incident Response

Triaging Security Incident with Ir Playbook

5m·intermediate
Incident Response

Containing Active Security Breach

4m·advanced
Incident Response

Implementing Velociraptor for Ir Collection

4m·advanced

Skill Details

Domain
Incident Response
Difficulty
intermediate
Read Time
4 min
Code Examples
6

On This Page

When to UsePrerequisitesWorkflowKey ConceptsTools & SystemsCommon ScenariosOutput FormatVerification CriteriaCompliance Framework MappingDeploying This Skill with Claw GRC

Deploy This Skill

Add this skill to your Claw GRC agent and start automating.

Get Started Free →