“If you do not ask the right question, you will not get the right answer.” — Olivier Serrat, “The Five Whys Technique

In the 21st century, cybersecurity is paramount to an organization’s survival. Yet many organizations have managed to get by with poor cybersecurity practices, which then only serves to reinforce the illusion that things are under control. Security leaders, C-suite executives and board directors tend to interpret near misses that go uninvestigated as evidence of the organization’s ability to successfully protect or react to security incidents.

Eventually, your luck will run out, disaster will strike, and none of your systems or processes will be able to save your data. You will be left wondering where things went wrong and why your layers of protective, detective and reactive controls didn’t put a stop to threats when there was still a chance.

Hold on to that inquisitive mindset: It could save your organization.

When Disaster Strikes

Why do disasters happen? What could we have done to prevent them? In his 2008 book “Outliers,” Malcolm Gladwell explored the lessons that can be drawn from studying aviation disasters, seeking to shed light on the root causes of some major crashes. The work, firmly grounded in the Federal Aviation Administration’s (FAA) Human Factors Analysis and Classification System (HFACS), pointed to the breakdown of communications inside the cockpit at key moments in the flight as a major source of human error, eventually leading to a perfect storm of factors contributing to a crash.

Yet airliners are built to very robust specifications and often have multiple resilient systems in case one fails. Similarly, today’s information technology systems and their accompanying security controls provide robust and fairly resilient systems that ensure the confidentiality, integrity and availability of data throughout the enterprise. Of course, having safety systems and resilience doesn’t completely eliminate the potential for disasters, much like having brakes on cars doesn’t remove the chance of a crash.

After an incident, it is tempting to blame someone, as was too often done in FAA crash investigations: “Unfortunately the root cause analysis of an accident often stops after the simple finding of ‘failure to follow procedures.’ This failure goes far beyond a ‘lazy mechanic’ who chooses to be noncompliant.”

What we need is a straightforward but effective technique to guide us to determine the root cause — not the person to blame — and thus identify elements that can be improved or tweaked to prevent future incidents.

The Five Whys

The Five Whys is a method of exploring cause-and-effect relationships. This technique can be used as part of a root-cause analysis to uncover ways to avoid future incidents. When applied to recent near misses, it can help prevent future events from turning into full-blown disasters.

The Five Whys technique helps investigators and analysts determine the root cause of a problem by repeatedly asking, “Why?” Investigators are cautioned to use deduction, to focus on processes and not behavior, to avoid jumping to conclusions, and to focus on causes, not symptoms.

Fast Company provided an example of the Five Whys technique in action:

  1. Why did the machine stop? (There was an overload and the fuse blew.)
  2. Why was there an overload? (The bearing was not sufficiently lubricated.)
  3. Why was it not lubricated sufficiently? (The lubrication pump was not pumping sufficiently.)
  4. Why was it not pumping sufficiently? (The shaft of the pump was worn and rattling.)
  5. Why was the shaft worn out? (There was no strainer attached and metal scrap got in.)

Ask the Right Questions

Don’t let a near miss go uninvestigated. After all, a near miss could become a serious incident if not for a lucky catch by a security control, a call from an attentive employee who remembered his or her security awareness training, or a smart decision by security leadership to learn as much as possible from previous incidents (or near incidents) and apply those lessons to the entire security apparatus.

While not without its flaws, the Five Whys technique can help foster a sound and systematic approach to investigating both incidents and near misses. It puts the organization on a path to continuous self-improvement and provides improved clarity about just how efficient its security controls truly are.

Listen to the podcast: Have a Plan, Practice It and Then Practice It Again

More from Incident Response

Cybersecurity crisis communication: What to do

4 min read - Cybersecurity experts tell organizations that the question is not if they will become the target of a cyberattack but when. Often, the focus of response preparedness is on the technical aspects — how to stop the breach from continuing, recovering data and getting the business back online. While these tasks are critical, many organizations overlook a key part of response preparedness: crisis communication.Because a brand’s reputation often takes a significant hit, a cyberattack can significantly affect the company’s future success…

3 recommendations for adopting generative AI for cyber defense

3 min read - In the past eighteen months, generative AI (gen AI) has gone from being the source of jaw-dropping demos to a top strategic priority in nearly every industry. A majority of CEOs report feeling under pressure to invest in gen AI. Product teams are now scrambling to build gen AI into their solutions and services. The EU and US are beginning to put new regulatory frameworks in place to manage AI risks.Amid all this commotion, hackers and other cybercriminals are hardly…

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today