In the wake of a cybersecurity incident, executives often pose a deceptively simple question to their incident response teams: “Can you tell us exactly how the attackers got in, what they did while inside, and whether they’re still there?”
It’s a fair ask – after all, clarity drives decisions on containment, recovery, and disclosure. Yet the reality is far more nuanced. The ability to deliver precise, defensible answers hinges less on the sophistication of the forensics team and more on the proactive measures your organization implemented before the breach ever occurred.
Here’s the hard truth: A breach investigation is only as good as the data you preserved in advance.
The Three Questions – and Why They’re Not Always Answerable
Without comprehensive ingress logging (e.g., firewall, WAF, email gateway, and endpoint telemetry), attackers can enter through blind spots.
Example: A phishing email deletes itself after execution, and no mail flow logs are retained beyond 30 days. Result? The initial vector becomes a hypothesis, not a fact.
Lateral movement, privilege escalation, and data exfiltration leave traces – but only if you’re capturing them.
Persistence mechanisms (scheduled tasks, registry run keys, rogue accounts) are detectable – but only if you have a baseline of “normal.”
The Pre-Breach Decisions That Determine Post-Breach Clarity
|
Pre-Breach Action |
Post-Breach Impact |
|
Log retention < 90 days |
Critical evidence overwritten; timeline gaps |
|
No EDR or SIEM |
Blind to lateral movement; “We think they were here for 6 months” |
|
Default admin accounts |
Impossible to distinguish legit vs. attacker activity |
|
No network segmentation |
Attackers roam freely; scope becomes “the entire domain” |
|
Immutable backups offline |
Fast recovery; reduces attacker leverage |
|
Regular threat hunting |
Baselines exist; anomalies stand out |
Real-World Example
A mid-sized financial firm suffered a ransomware attack. Leadership demanded: “Show us the patient zero and prove they’re gone.”
The problem:
The outcome:
Cost: $4.2M in downtime, forensics, and recovery
Lesson: They paid for reactive clarity with proactive neglect.
Your Action Plan Before the Next Incident
The next time your CISO says, “We can’t be 100% sure,” don’t blame the investigators. Blame the architecture built when “it won’t happen to us” was the strategy.
Cyber resilience isn’t just about stopping breaches – it’s about ensuring that when one occurs, you can answer the hard questions with evidence, not excuses.
If you have questions or want to discuss any of Avalon's cybersecurity services, contact our experts today.