Conducts structured post-breach remediation using lessons learned framework: root cause fixes, control gap closure, policy/training updates, monitoring enhancements, regulatory follow-up. For preventing data breach recurrence.
npx claudepluginhub mukul975/privacy-data-protection-skills --plugin privacy-skills-completeThis skill uses the workspace's default tool permissions.
Post-breach remediation transforms the findings from a breach investigation into concrete corrective actions that prevent recurrence and demonstrate accountability under GDPR Art. 5(2) and Art. 24. Effective remediation goes beyond fixing the immediate vulnerability — it addresses root causes, closes systemic control gaps, updates policies and training, enhances monitoring, and satisfies regula...
Conducts multi-round deep research on GitHub repos via API and web searches, generating markdown reports with executive summaries, timelines, metrics, and Mermaid diagrams.
Dynamically discovers and combines enabled skills into cohesive, unexpected delightful experiences like interactive HTML or themed artifacts. Activates on 'surprise me', inspiration, or boredom cues.
Generates images from structured JSON prompts via Python script execution. Supports reference images and aspect ratios for characters, scenes, products, visuals.
Post-breach remediation transforms the findings from a breach investigation into concrete corrective actions that prevent recurrence and demonstrate accountability under GDPR Art. 5(2) and Art. 24. Effective remediation goes beyond fixing the immediate vulnerability — it addresses root causes, closes systemic control gaps, updates policies and training, enhances monitoring, and satisfies regulatory follow-up requirements.
Address the direct technical and procedural cause of the breach:
| Root Cause Category | Remediation Approach | Example (SPG-BREACH-2026-003) |
|---|---|---|
| Stale privileged account | Decommission account, implement lifecycle management | Revoked svc-migration-2024; deployed automated service account expiry (90-day review cycle) |
| Phishing vulnerability | Deploy phishing-resistant MFA, enhance email filtering | Migrated from push-based MFA to FIDO2/WebAuthn for all privileged accounts |
| Insufficient network segmentation | Implement micro-segmentation | Deployed database-tier isolation; access only via approved bastion host with session recording |
| Inadequate access review scope | Expand access review to include all account types | Added service accounts, API keys, and machine accounts to quarterly access certification |
Identify and close broader security and privacy control gaps revealed by the breach:
Review and update affected policies based on breach findings:
| Policy | Update Required | Owner | Deadline |
|---|---|---|---|
| Access Control Policy | Include service accounts in scope; define lifecycle management requirements | CISO | 15 April 2026 |
| Incident Response Plan | Update awareness definition; add holding statement template; revise escalation matrix | DPO + CISO | 30 April 2026 |
| Ransom Payment Policy | Document Board-approved position on ransom payments | General Counsel | 31 May 2026 |
| Vendor Risk Management | Add security assessment questionnaire updates based on processor breach lessons | Procurement + DPO | 30 June 2026 |
| Data Retention Policy | Verify that expired data was actually deleted per schedule (breach may have revealed retention failures) | DPO | 30 June 2026 |
Update training programs to address the human factors contributing to the breach:
| Training Module | Target Audience | Update | Delivery Method |
|---|---|---|---|
| Phishing awareness | All employees | Add scenario based on the actual phishing email that initiated SPG-BREACH-2026-003 (with identifying details removed) | Interactive simulation via KnowBe4 |
| MFA security | All employees with MFA | Add push-fatigue attack awareness; train on rejecting unexpected MFA prompts | Mandatory e-learning module |
| Incident reporting | All employees | Clarify that unusual system behavior must be reported immediately, even if uncertain | Updated in annual privacy awareness training |
| Breach response | Incident response team | Tabletop exercise based on this breach scenario | Semi-annual tabletop exercise |
| Privileged access management | IT operations, DBAs | Service account lifecycle management procedures | Department-specific workshop |
Strengthen detection and monitoring based on gaps the breach revealed:
| Enhancement | Description | Owner | Deadline |
|---|---|---|---|
| Service account anomaly detection | SIEM rule to alert when service accounts authenticate outside scheduled batch windows or from non-whitelisted IPs | SOC Lead | 15 April 2026 |
| MFA push-fatigue detection | Alert when an account receives more than 3 MFA push notifications in 5 minutes without successful authentication | SOC Lead | 30 April 2026 |
| Tor exit node blocking | Block authentication attempts from known Tor exit nodes for all production systems | Network Security | 15 April 2026 |
| Network flow baseline for database tier | Establish outbound data transfer baselines for database VLAN; alert on anomalies | SOC Lead | 31 May 2026 |
Manage ongoing obligations to supervisory authorities:
| Field | Description |
|---|---|
| Action ID | Unique identifier (SPG-BREACH-2026-003-REM-001) |
| Breach reference | Link to the source breach |
| Description | What needs to be done |
| Root cause addressed | Which root cause or gap this action closes |
| Owner | Person responsible for completion |
| Priority | Critical / High / Medium / Low |
| Target date | Planned completion date |
| Actual completion date | When the action was verified as complete |
| Evidence | Documentation proving completion (screenshot, policy version, test report) |
| Verified by | Person who verified the action was effectively implemented |
| Days Overdue | Escalation |
|---|---|
| 1-7 days | Reminder to action owner |
| 8-14 days | Escalation to action owner's manager |
| 15-30 days | Escalation to DPO and CISO |
| 30+ days | Escalation to CEO; inclusion in Board Audit Committee report |
Under GDPR Art. 5(2), the controller must demonstrate compliance. Post-breach remediation evidence serves this purpose:
A supervisory authority reviewing the organization's breach response will assess not only whether the breach was handled correctly but whether the organization took meaningful steps to prevent recurrence.