“If you do not ask the right question, you will not get the right answer.” — Olivier Serrat, “The Five Whys Technique

In the 21st century, cybersecurity is paramount to an organization’s survival. Yet many organizations have managed to get by with poor cybersecurity practices, which then only serves to reinforce the illusion that things are under control. Security leaders, C-suite executives and board directors tend to interpret near misses that go uninvestigated as evidence of the organization’s ability to successfully protect or react to security incidents.

Eventually, your luck will run out, disaster will strike, and none of your systems or processes will be able to save your data. You will be left wondering where things went wrong and why your layers of protective, detective and reactive controls didn’t put a stop to threats when there was still a chance.

Hold on to that inquisitive mindset: It could save your organization.

When Disaster Strikes

Why do disasters happen? What could we have done to prevent them? In his 2008 book “Outliers,” Malcolm Gladwell explored the lessons that can be drawn from studying aviation disasters, seeking to shed light on the root causes of some major crashes. The work, firmly grounded in the Federal Aviation Administration’s (FAA) Human Factors Analysis and Classification System (HFACS), pointed to the breakdown of communications inside the cockpit at key moments in the flight as a major source of human error, eventually leading to a perfect storm of factors contributing to a crash.

Yet airliners are built to very robust specifications and often have multiple resilient systems in case one fails. Similarly, today’s information technology systems and their accompanying security controls provide robust and fairly resilient systems that ensure the confidentiality, integrity and availability of data throughout the enterprise. Of course, having safety systems and resilience doesn’t completely eliminate the potential for disasters, much like having brakes on cars doesn’t remove the chance of a crash.

After an incident, it is tempting to blame someone, as was too often done in FAA crash investigations: “Unfortunately the root cause analysis of an accident often stops after the simple finding of ‘failure to follow procedures.’ This failure goes far beyond a ‘lazy mechanic’ who chooses to be noncompliant.”

What we need is a straightforward but effective technique to guide us to determine the root cause — not the person to blame — and thus identify elements that can be improved or tweaked to prevent future incidents.

The Five Whys

The Five Whys is a method of exploring cause-and-effect relationships. This technique can be used as part of a root-cause analysis to uncover ways to avoid future incidents. When applied to recent near misses, it can help prevent future events from turning into full-blown disasters.

The Five Whys technique helps investigators and analysts determine the root cause of a problem by repeatedly asking, “Why?” Investigators are cautioned to use deduction, to focus on processes and not behavior, to avoid jumping to conclusions, and to focus on causes, not symptoms.

Fast Company provided an example of the Five Whys technique in action:

  1. Why did the machine stop? (There was an overload and the fuse blew.)
  2. Why was there an overload? (The bearing was not sufficiently lubricated.)
  3. Why was it not lubricated sufficiently? (The lubrication pump was not pumping sufficiently.)
  4. Why was it not pumping sufficiently? (The shaft of the pump was worn and rattling.)
  5. Why was the shaft worn out? (There was no strainer attached and metal scrap got in.)

Ask the Right Questions

Don’t let a near miss go uninvestigated. After all, a near miss could become a serious incident if not for a lucky catch by a security control, a call from an attentive employee who remembered his or her security awareness training, or a smart decision by security leadership to learn as much as possible from previous incidents (or near incidents) and apply those lessons to the entire security apparatus.

While not without its flaws, the Five Whys technique can help foster a sound and systematic approach to investigating both incidents and near misses. It puts the organization on a path to continuous self-improvement and provides improved clarity about just how efficient its security controls truly are.

Listen to the podcast: Have a Plan, Practice It and Then Practice It Again

More from Incident Response

Why federal agencies need a mission-centered cyber response

4 min read - Cybersecurity continues to be a top focus for government agencies with new cybersecurity requirements. Threats in recent years have crossed from the digital world to the physical and even involved critical infrastructure, such as the cyberattack on SolarWinds and the Colonial Pipeline ransomware attack. According to the IBM Cost of a Data Breach 2023 Report, a breach in the public sector, which includes government agencies, is up to $2.6 million from $2.07 million in 2022. Government agencies need to move…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

What cybersecurity pros can learn from first responders

4 min read - Though they may initially seem very different, there are some compelling similarities between cybersecurity professionals and traditional first responders like police and EMTs. After all, in a world where a cyberattack on critical infrastructure could cause untold damage and harm, cyber responders must be ready for anything. But are they actually prepared? Compared to the readiness of traditional first responders, how do cybersecurity professionals in incident response stand up? Let’s dig deeper into whether the same sense of urgency exists…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today