Enterprise18 min read

Security Incident Postmortem and After-Action Review Guide

Most security incident postmortems produce a polished narrative and no learning. The facilitator opens the session, the audience walks through what happened from memory, the conversation drifts toward who could have done what differently, the corrective actions land in a document the audit committee never opens, and three months later the same gap shows up in the next incident. This guide is for CISOs, security operations leaders, IR managers, AppSec leads, GRC owners, and security engineering teams who want the opposite: a postmortem programme that genuinely improves the operating model, names the contributing factors honestly, tracks the corrective actions to closure, and produces evidence that survives ISO 27001, SOC 2, PCI DSS, NIST 800-53, NIST 800-61, HIPAA, NIS2, DORA, FedRAMP, and HITRUST review. The guide assumes the response itself has already finished; the incident response plan guide covers the upstream artefact, and the tabletop exercise guide covers the rehearsal. The postmortem is what closes the loop after the incident is real.

What a Security Incident Postmortem Is, and What It Is Not

A security incident postmortem is a structured retrospective that runs after every qualifying incident, walks the named audience through the reconstructed timeline of the event, names the contributing factors that allowed the incident to start and persist, scores the detection and containment effectiveness against the documented playbook, audits the cross-functional and customer communication discipline, and produces an after-action report with a corrective action ledger that tracks the actions to closure. The point is to convert the operational truth of the incident into a system change so the next incident finds the gap already closed.

A postmortem is not a status meeting. The response has already happened by the time the session opens; the audience is not coordinating the response. A postmortem is not an executive briefing. The executive briefing on the incident runs on a separate cadence with a different audience and a different artefact. A postmortem is not a public communication exercise. Customer-facing summaries, regulator notifications, and disclosure statements are downstream products that draw selectively from the after-action; the after-action itself is the operational record.

A postmortem is also not a substitute for the management process that handles personal accountability questions. Whether an individual operator was within policy, whether the role was correctly scoped, whether the responder was competent for the situation assigned to them, all belong to HR, line management, or executive review on separate cadences with their own privacy and due-process protections. The postmortem produces the contributing factor analysis and the corrective actions; the management process handles the people questions. Conflating the two reliably destroys both.

Postmortem and After-Action Review: One Artefact Pattern, Two Lineages

Postmortem comes from site reliability engineering and the blameless retrospective tradition. The emphasis is on root cause language, the contributing factor analysis, and engineering corrective actions. After-action review (AAR) comes from military and emergency-management practice. The emphasis is on the four-question structure: what was supposed to happen, what did happen, why there was a gap, what the response audience will do differently.

Mature security programmes converge on a hybrid that takes the blameless operating principle and the contributing factor analysis from the postmortem tradition and the four-question structure and the corrective action ledger from the AAR tradition. The artefact name matters less than the discipline. What the audit asks for is the structured record of what happened, why it happened, what was learned, and what will change.

This guide uses postmortem and after-action review as synonyms for the same artefact pattern. The deliverable is the after-action report carrying the timeline, the contributing factors, the effectiveness scoring, the communication audit, the corrective action ledger, and the framework alignment statement.

When to Trigger a Postmortem

Not every incident gets an individual postmortem. A mature programme defines the trigger conditions in the IR plan so the response audience knows up front when a full-scope review will run. A practical trigger set covers any incident classified as high or critical severity, any incident that produced customer-facing impact, any incident that triggered an external disclosure clock, any incident that consumed more than a defined response-hour budget, any incident involving a third-party vendor or supply chain element, any incident that revealed a previously unknown vulnerability in production, and any incident that the executive sponsor or the audit committee specifically requested a review for.

Lower-severity incidents are batched into a monthly trend review rather than each receiving an individual session. The trend review uses the same operating discipline: a reconstructed view of the month, a contributing factor analysis at the class level, a detection effectiveness signal, and a corrective action ledger. The batched review keeps the discipline visible without overloading the cadence.

For public-company registrants, any incident that runs through the SEC materiality determination workflow described in the SEC cybersecurity incident materiality guide triggers a full postmortem regardless of severity classification, because the disclosure committee and the audit committee will both ask for the after-action as part of the year-end review. For financial entities under DORA Articles 17 and 18, every major ICT-related incident triggers a post-event review. For organisations under NIS2 Article 21, the same standard applies to significant incidents.

Audience and Authority: Who Has to Be in the Room

The audience is determined by the incident scope, not by convention. The wrong audience is the most common reason a postmortem produces no learning: if the people who carried the response and the people who own the affected systems are not in the room, the contributing factor analysis cannot be tested against the operational truth.

The recurring audience archetypes are summarised below. Each role attends as participant, observer, or scribe; the role is named in the charter and recorded in the after-action.

  • IR commander. Owned the response end to end. Walks the audience through the response decisions, names the moments the playbook held, and names the moments it did not.
  • SOC analyst(s). Carried the detection-to-containment work. Surfaces the alert that fired or did not fire, the log that was or was not available, and the time elapsed at each step.
  • Responsible platform or product engineering lead.Owns the affected system. Speaks to the technical containment, the recovery, and any control gaps that the incident exposed.
  • Security engineering or AppSec owner. Owns the controls or pipeline that were tested by the incident. Speaks to the detection pipeline, the upstream prevention controls, and the AppSec discipline that the incident either bypassed or exercised.
  • Legal and compliance lead. Required if the incident triggered any notification or disclosure dimension. Speaks to the regulatory clocks, the contractual notification obligations, and the litigation hold posture.
  • Privacy officer. Required if any personal data was implicated. Speaks to the affected-population estimate, the breach-notification clocks under GDPR, state breach laws, and sectoral regimes.
  • Communications and PR lead. Required if any external messaging ran. Speaks to the customer messaging, the regulator narrative, and the press posture.
  • Executive sponsor. Required for incidents above a defined severity threshold. Speaks to the business decisions, the customer relationship dimension, and the budget for corrective actions.
  • Disclosure committee chair. Required if a materiality determination ran. Speaks to the determination, the disclosure timing, and the audit committee posture.
  • Customer success or service operations lead.Required for customer-impact incidents. Speaks to the customer-facing communication and the support volume.
  • HR. Required for insider misuse postmortems. Pairs with legal on disciplinary and evidence-preservation posture.
  • Facilitator and scribe. Non-decision audience. The facilitator is a senior security leader who did not run the response. The scribe captures the structured record in real time and confirms each entry verbally.

The Blameless Operating Principle

Blameless does not mean accountability-free. The blameless operating principle says the session is not the venue to assign personal blame and that the audience under analysis is the system, not any individual operator under stress in the moment. Incidents are caused by systems: systems of decisions, defaults, controls, instrumentation, runbook coverage, training, and pressure. The session that frames the discussion as an individual mistake produces silence; the session that frames the discussion as a system gap produces learning.

The facilitator opens every postmortem with the blameless framing read aloud. The framing names what the session is for (system improvement), what it is not for (personal blame), and where the personal accountability questions go (the management process on a separate cadence). The framing is not decorative; it is the precondition that makes the contributing factor analysis honest.

Blameless also disciplines the language of the after-action. The contributing factors are named as system classes (control gap, detection gap, runbook gap, authority gap, training gap, evidence gap, communication gap), not as named individuals or named errors. The corrective actions change the system, not the person. Where a personal-accountability question is genuinely warranted, the facilitator records that a management-process follow-up has been routed and stops there. The session does not adjudicate it.

For programmes that have not yet internalised the blameless discipline, the most effective change is to put the framing in the charter, train the audience on it before the first session, and have the senior accountable owner of the IR programme model the language. Blameless culture is downstream of the operating practice; the practice comes first.

The Postmortem Charter Sets Boundary and Authority

Every postmortem opens with a charter that names the incident, the boundary of the review, the audience, the framework expectations the review evidences, and the senior accountable owner of the IR programme who signs off the resulting after-action. A reviewer should know in the first paragraph what the session covers, what it does not cover, and what the audit case is.

A defensible charter carries the incident reference and severity classification; the incident class (data exposure, control plane compromise, ransomware, account takeover, third-party breach, insider misuse, denial of service, other); the boundary of the review (the systems, the customer-impact dimension, the time window); the audience by role; the framework expectations evidenced (ISO 27001 Annex A 5.27; SOC 2 CC7.4, CC7.5; PCI DSS 12.10.6; NIST SP 800-61 Section 3.4; NIST 800-53 IR-4, IR-8; HIPAA 164.308(a)(7); NIS2 Article 21; DORA Articles 17 and 18; sector overlays; internal policy); the senior accountable owner who signs off; the read-ahead pack reference; and the closure target date for the after-action and the corrective action ledger.

The charter is filed on the workspace at the moment the session is scheduled, not after the meeting. A workspace that holds the charter alongside the engagement record means the review traceability is observable on the same platform that holds findings, controls, and evidence. The closure target date keeps the report from drifting past the operating cadence.

Timeline Reconstruction Is Prepared Before the Session

The single biggest determinant of postmortem quality is whether the timeline was reconstructed before the session opened. Sessions that try to assemble the timeline from audience memory during the meeting produce shallow contributing factor analysis and inconsistent corrective actions. Sessions that open with a reconstructed timeline distributed in advance produce learning.

The facilitator and the scribe pull the reconstruction from the operational record before the meeting: SIEM event timestamps, EDR alert timestamps, ticketing or chat message timestamps, video conference recording timestamps, the working notes captured during the response, the activity log entries from any platform that recorded state changes, the pager-out and stand-down timestamps for the IR commander, the customer notification dispatch timestamps, and the regulator notification dispatch timestamps.

The reconstructed timeline is tabular and carries the event class, the timestamp in UTC, the named source system, the named operator if applicable, and a one-line summary. Where timestamps disagree across sources, the timeline records both with a note explaining the discrepancy. The reconstructed timeline goes out as a read-ahead pack with the session invite at least two business days before the session so the audience reads the same operational truth before the meeting opens.

The session opens with the facilitator walking the timeline section by section, soliciting corrections and additions, and confirming the working timeline before the contributing factor analysis begins. The confirmed timeline is what the after-action attaches; the audience cannot disagree with the operational truth they have already ratified.

Contributing Factor Analysis Names System Classes, Not People

Contributing factors are the system gaps and conditions that allowed the incident to start, persist, or expand. They are named explicitly in the after-action and grouped into a small number of recurring classes. Naming the factors as system classes rather than as personal failings keeps the session blameless and produces corrective actions that change the system.

  • Control gap. A technical control was missing, misconfigured, or not yet rolled out across the affected estate. The contributing factor names the control, the affected systems, and the policy or design that the control should have implemented.
  • Detection gap. A signal that should have fired earlier did not fire, a log that should have been collected was not, an alert that fired was routed to the wrong queue, or a rule that should have correlated was not in place. The contributing factor names the signal, the source pipeline, and the missing detection logic.
  • Runbook gap. The playbook did not cover the situation, the playbook was wrong, or the operator did not know the playbook existed. The contributing factor names the missing or wrong runbook section and the evidence that the gap shaped the response.
  • Authority gap. The decision-maker was not available, the authority was unclear, or the escalation path failed in practice. The contributing factor names the decision point, the documented escalation, and the break between documented and actual.
  • Training gap. The operator was not familiar with the system, the playbook, or the decision standard that the situation required. The contributing factor names the training requirement and the gap between expected and observed proficiency.
  • Evidence gap. The operational record did not capture what the after-action needed: timestamps, decisions, communications, the authoritative version of an artefact. The contributing factor names the missing evidence and the upstream practice that did not produce it.
  • Communication gap. The cross-functional handoff failed, the customer notification was late, the regulator narrative was unprepared, or the executive briefing produced a misunderstanding. The contributing factor names the handoff, the documented expectation, and the break.
  • Supply chain or third-party gap. A vendor, a dependency, a SaaS provider, or a managed service introduced the condition or amplified the blast radius. The contributing factor names the third party, the contract clause that did or did not cover the situation, and the dependency posture that needs to change.

Each contributing factor is recorded in the after-action with a one-paragraph description, an explicit reference to the timeline entries that surface it, and a link to the corrective action that addresses it. A contributing factor that does not point to a corrective action is recorded with a deliberate note explaining why the programme has decided not to address it; silent omissions create audit risk and erode the operating discipline.

Detection and Containment Effectiveness Review

The contributing factor analysis names the system gaps. The effectiveness review scores how the response actually performed against the documented playbook. The two sections are complementary; the effectiveness review surfaces failures of the documented model and the contributing factor analysis surfaces failures of the underlying system.

The detection effectiveness review walks the timeline from initial signal to declared incident and scores against four dimensions. Time to detect from initial activity to first signal. Time to escalate from first signal to declared incident. Coverage completeness against the documented detection logic for the incident class. Signal quality, scored against false-positive history and the operator confidence in the initial signal. Each dimension carries a score on a defined scale and a one-paragraph narrative explaining the score.

The containment effectiveness review walks the timeline from declared incident through containment, eradication, and recovery, and scores against four dimensions. Time to contain from declaration to confirmed containment. Containment completeness against the documented runbook. Recovery sequencing against documented business-continuity priorities. Evidence preservation discipline during containment and recovery. Each dimension carries the same scoring discipline as the detection review.

The effectiveness review is not a performance rating of the responders. The blameless framing applies here too: the review scores the playbook against the incident, not the operators against the playbook. Where the operators improvised because the playbook did not cover the situation, the effectiveness review records the improvisation as evidence that the playbook needs to change, not that the operators erred.

The Communication Audit Covers Internal, Customer, and Regulator

The communication audit is the section that most postmortems either skip or summarise in a sentence. Communication failures are among the most expensive in the aftermath of an incident: a late customer notification damages trust, a poorly framed regulator disclosure invites scrutiny, an internal cross-functional handoff that loses key context extends the incident, and an executive briefing that misleads the board destroys credibility on the next cycle. The audit deserves its own section.

A defensible communication audit walks each channel separately. Internal handoffs: SOC-to-IR, IR-to-platform engineering, IR-to-legal, IR-to-communications, IR-to-executive. Customer messaging: who drafted, who approved, what channel, what timestamp, what response. Regulator disclosure: the named regulator, the clock that ran, the dispatched filing, the timestamp, the regulator response. Press posture: any inquiries received, the responses given, the timestamps. Disclosure committee posture: for public-company registrants, the materiality determination, the disclosure decision, the filing timestamp, the audit committee briefing.

Each channel is scored against the documented expectation and the actual practice. Where the documented expectation does not exist, the audit records the gap as a contributing factor in the communication-gap class. The audit closes with a summary paragraph that names the strongest and weakest channels of the response, with explicit links to the corrective actions that strengthen the weak channels.

The Corrective Action Ledger Is the Load-Bearing Artefact

The corrective action ledger is the bridge between the postmortem and the operating queue. Without a tracked ledger, the after-action is a filed document and the same gaps reappear in the next incident. With a tracked ledger, the postmortem closes the loop on the system change.

Each action carries a named owner, a due date based on severity and complexity, a target evidence statement that names what the closure will show, a status, and an explicit reference to the contributing factor that motivated the action. Actions that are inherited by other programmes (platform engineering work, IT operations work, training delivery, contract renegotiation with a third party) carry a cross-reference to the receiving queue and a closure-confirmation requirement. Long-running structural actions (rebuild the alert pipeline, replatform a legacy service, run a new training curriculum) are split into milestones with their own due dates.

The ledger is reviewed at the operating cadence of the IR programme. A senior security leader walks the ledger at every weekly programme stand-up, escalates overdue items at the bi-weekly leadership cadence, and reports the closure rate at the quarterly leadership review described in the security program KPIs and metrics framework and the broader cadence covered in the security leadership reporting workflow. The closure rate is a programme indicator in its own right; chronic ledger drift is treated as a programme finding that the senior accountable owner addresses.

Actions that touched a vulnerability fix are verified through the retesting workflow. A corrective action that says the patch was deployed is not closed until the retest confirms the vulnerability is no longer detectable. The fix verification workflow covers the discipline.

Framework Alignment Statement Ties the Review to the Audit

Multiple frameworks expect documented post-incident review with corrective action tracking. One operating cadence produces evidence for all the relevant catalogues simultaneously, provided the after-action carries an explicit framework alignment statement that names the controls the artefact evidences.

  • ISO/IEC 27001 Annex A 5.27. Expects learning from information security incidents to reduce likelihood or impact of future incidents.
  • SOC 2 CC7.4 and CC7.5. Expect the entity to respond to identified security incidents and to develop improvement procedures.
  • PCI DSS Requirement 12.10.6. Expects modification of the incident response plan based on lessons learned and industry developments.
  • NIST SP 800-61 Section 3.4. Covers the lessons learned phase and recommends a formal meeting after major incidents.
  • NIST 800-53 IR-4 and IR-8. Expect incident handling and reporting that includes lessons learned and improvement.
  • HIPAA 164.308(a)(7). Expects testing and revision of contingency plans, which the postmortem and corrective action ledger satisfy.
  • NIS2 Article 21. Expects continuous improvement of incident management for essential and important entities.
  • DORA Articles 17 and 18. Expect post-event reviews and continuous improvement for ICT-related incidents at financial entities.
  • FedRAMP IR-4 and IR-8. Align to the NIST 800-53 IR family for federal authorisation.
  • HITRUST common security framework. Tracks the same disciplines through its incident management requirements.

The compliance crosswalk for the broader programme is documented in the control mapping cross-framework crosswalks workflow. The framework alignment statement on each after-action ties to the crosswalk so the artefact is reconcilable on a per-control basis.

Cadence: Per-Incident, Monthly Trend, Quarterly Programme

A defensible postmortem programme layers three cadences. The per-incident cadence runs an individual postmortem for every qualifying incident inside a defined target window from the incident closure. A typical target is fourteen calendar days for critical incidents and twenty-eight days for high-severity incidents; the target is documented in the IR plan and the closure rate is tracked as a programme indicator.

The monthly trend review aggregates lower-severity incidents and surfaces patterns across the month: recurring contributing factor classes, persistent detection-gap sources, repeated communication breakdowns, and the closure trajectory of the corrective action ledger across the programme. The trend review is the venue that spots system-level changes that an individual postmortem cannot see.

The quarterly programme review folds postmortem signal into the broader security programme cadence. The corrective action closure rate, the recurring contributing factor classes, the detection effectiveness trend, and the communication audit findings each surface at the quarterly leadership review. The security program quarterly review template provides the structure the cadence runs against.

How SecPortal Supports the Postmortem Programme

SecPortal supports the postmortem programme as an evidence-grade record alongside the rest of the security work. Each qualifying postmortem can be treated as an engagement on the workspace, with the reconstructed timeline, the read-ahead pack, the contributing factor analysis, the detection and containment effectiveness scoring, the communication audit, the after-action report, and the corrective action ledger living on the engagement.

The append-only activity log captures every state change on the workspace with timestamps and is exportable to CSV for audit committee and external auditor review. The document management surface holds the source materials, the read-ahead, the framework crosswalks, and the versioned drafts of the after-action so reviewers can see how the analysis evolved.

The findings management model tracks the contributing factors and the corrective actions, each with named owner, severity, status, due date, and closure evidence. Where the corrective action is verifying a patch landed, the retesting workflow confirms the vulnerability is no longer detectable before the action is closed.

AI report generation drafts the after-action narrative from the structured record, regenerating as the contributing factor analysis evolves through the session and as the corrective action ledger fills in. The team management and role-based access primitives keep the facilitator, the scribe, the senior accountable owner, and the rest of the audience at the appropriate workspace scoping, and MFA enforcement protects the workspace at the authentication boundary.

Compliance tracking maps the review to the relevant control catalogues so the framework alignment statement is reconcilable from the same workspace. The compliance crosswalk inherits from the SecPortal framework templates and exports to CSV for the audit committee.

Honest Scope: What SecPortal Does Not Do

The postmortem programme runs on the workspace as a record-of-truth, not as an integration hub. SecPortal does not synchronise the corrective action ledger to external project-management or ticketing systems; there is no native Jira, ServiceNow, Linear, Azure DevOps, Slack, Teams, PagerDuty, SIEM, or SOAR integration. The corrective actions are tracked on the workspace; where the receiving team works in a different ticketing system, the workspace record references the ticket id in the working notes and the closure-confirmation step records the cross-system update.

SecPortal does not replace the facilitator and does not produce the contributing factor analysis automatically. The platform carries the structured record and supports the workflow; the audience reads the timeline, names the factors honestly, and writes the corrective actions. The AI report generation drafts the narrative; the senior accountable owner reviews and signs off. The discipline is what produces the learning; the tooling makes the discipline auditable.

Common Postmortem Failure Modes

Most underperforming postmortem programmes fail in a small number of recurring ways. Naming them up front makes them easier to avoid.

  • Session without a reconstructed timeline. The audience reconstructs from memory, the contributing factor analysis is shallow, and the after-action is contested afterwards. Solve by preparing the timeline before the session and distributing it as a read-ahead at least two business days ahead.
  • Personal blame frame. The session devolves into who made what call, the audience disengages, and the next incident is not surfaced honestly. Solve by reading the blameless framing aloud at every session and routing personal-accountability questions to the management process.
  • Action ledger without owners or due dates.Corrective actions are recorded as paragraphs without named owners, due dates, or target evidence; the same gaps reappear in the next incident. Solve by treating corrective actions as findings on the workspace with named owners, due dates, target evidence, and a tracked closure rate.
  • After-action filed and forgotten. The report sits in a folder; the audit committee never sees it; the framework alignment statement is missing. Solve by routing the after-action through the quarterly leadership review and the audit committee briefing cadence, and by including the framework alignment statement at the end of every report.
  • Skipped for cross-functional handoff failures.Postmortems run for technical incidents and skip incidents that hit cross-functional handoffs, so the most-failing handoffs go unexamined. Solve by applying the trigger conditions consistently regardless of incident class.
  • No framework alignment statement. The artefact pattern does not satisfy the audit even when the content is strong. Solve by including the alignment statement at the end of every after-action, tied to the control mapping crosswalk for the programme.
  • No senior accountable sign-off. The operating chain is incomplete and the after-action can be disowned. Solve by requiring the senior accountable owner of the IR programme to sign off every after-action before it is filed.
  • Closure rate not tracked. Chronic ledger drift is invisible to leadership and the same gaps recur. Solve by treating the corrective action closure rate as a programme indicator and surfacing it at the bi-weekly leadership cadence and the quarterly programme review.
  • No monthly trend review. System-level patterns across lower-severity incidents go unseen. Solve by running the monthly trend review against the aggregated incident set and surfacing recurring contributing factor classes.
  • Mixing the postmortem with the executive briefing.The two run together and neither produces the artefact it should. Solve by running the postmortem with the response audience and the executive briefing on a separate cadence with the appropriate audience.

Adjacent Programme Pieces That Round Out the Capability

The postmortem is one artefact in a broader incident response and security programme capability. The pieces below pair with it directly; running the review without them produces a session that cannot be operationalised.

  • A documented incident response plan. The postmortem reviews the response against the plan; the plan has to exist first. The incident response plan guide covers the upstream artefact.
  • A tested response capability. The postmortem is meaningful only if the plan has been rehearsed and the audience knows how to operate the session. The tabletop exercise guide covers the rehearsal cadence.
  • An enterprise IR operating model. Multi-team organisations need the operating scaffolding that the enterprise incident response at scale guide describes; the postmortem tests the model the operating scaffolding produces.
  • A board-level reporting cadence. The after-action produces evidence the audit committee will ask for. The board-level security reporting guide covers the cadence that surfaces the after-action at the right rhythm.
  • A materiality determination workflow. For public-company registrants, the postmortem also reads against the materiality record. The SEC cybersecurity materiality guide covers the determination as a recurring discipline.
  • A finding fix-verification workflow. Corrective actions that touched a vulnerability fix close only after retest. The fix verification workflow covers the closure discipline.
  • A control mapping crosswalk. The framework alignment statement on every after-action reads against the programme crosswalk. The cross-framework crosswalk workflow covers the discipline.

Key Takeaways for the Postmortem Programme

  • A postmortem reviews the response, not the responder. The audience is the system that produced the incident, not any one operator. The blameless framing is the precondition that makes the analysis honest.
  • Triggers are defined in the IR plan. Critical and high-severity incidents, customer-impact incidents, regulator-disclosure incidents, and audit-requested incidents each receive an individual postmortem on a target turnaround.
  • The audience matches the incident. Response, platform, AppSec, legal, privacy, communications, executive, and disclosure-committee representation are present in the proportion the incident requires.
  • Timeline reconstruction is prepared before the session. Sessions that try to assemble the timeline from memory produce shallow analysis. The reconstructed timeline goes out as a read-ahead at least two business days ahead.
  • Contributing factors are named as system classes.Control gap, detection gap, runbook gap, authority gap, training gap, evidence gap, communication gap, supply-chain gap. Each factor points to a corrective action or records a deliberate decision not to act.
  • Effectiveness review scores the playbook against the incident. Detection and containment each carry four dimensions: time, completeness, sequencing, and quality. The review surfaces gaps in the documented model.
  • The communication audit is a full section.Internal handoffs, customer messaging, regulator disclosure, press posture, and disclosure committee posture each get explicit treatment.
  • The corrective action ledger has owners, due dates, and target evidence. The closure rate is a programme indicator tracked at the bi-weekly leadership cadence and the quarterly programme review.
  • One after-action evidences multiple frameworks.ISO 27001 A 5.27, SOC 2 CC7.4 and CC7.5, PCI DSS 12.10.6, NIST 800-61 Section 3.4, NIST 800-53 IR-4 and IR-8, HIPAA, NIS2, DORA, FedRAMP, and HITRUST reconcile to the same artefact provided the alignment statement is in the report.
  • The senior accountable owner signs off. The operating chain is complete and the artefact carries the authority the audit expects.
  • Three cadences layered. Per-incident, monthly trend review, quarterly programme review. The cadence makes the discipline visible and surfaces system-level patterns.
  • Bind the programme to a reconcilable record.When the timeline, the contributing factor analysis, the effectiveness review, the communication audit, the after-action, and the corrective action ledger live on one workspace with timestamped state changes, the evidence trail survives audit and the programme improves between incidents.

Run the postmortem programme on the same record as the rest of the security work

SecPortal holds the timeline, the contributing factor analysis, the effectiveness scoring, the communication audit, the after-action, and the corrective action ledger on a single workspace, captures every state change in an exportable activity log, produces the narrative draft from the structured record, and ties the review to the relevant control catalogues so the audit posture is reconcilable end to end.

Free tier available. No credit card required.