IAM Incident Response Playbook: Handling Identity Breaches, Compromised Credentials, and Privilege Escalation
A comprehensive playbook for responding to identity-related security incidents, including credential compromise, privilege escalation, and identity infrastructure attacks with forensic investigation guidance.
IAM Incident Response Playbook: Handling Identity Breaches and Privilege Escalation
When an identity-related security incident strikes, the first 60 minutes determine whether it becomes a contained event or a full-scale breach. Yet most organizations discover that their general incident response plans treat identity incidents as an afterthought—a category of alerts to be triaged like any other. Identity incidents are different. They are faster-moving, harder to scope, and more likely to cascade across systems than network or endpoint events.
This playbook provides a structured, actionable framework for responding to the most common and most dangerous identity security incidents. It covers detection through remediation, with specific procedures for credential compromise, privilege escalation, and attacks targeting identity infrastructure itself.
Why This Matters
Identity is the new perimeter, and identity incidents are now the primary vector for enterprise breaches. According to recent data, 80% of breaches involve compromised credentials, and the average time to detect an identity-based attack is 250 days—compared to 197 days for other attack types.
The reason identity incidents are so dangerous is their multiplicative nature. A single compromised credential can lead to lateral movement across dozens of systems. A privilege escalation incident can grant an attacker administrative control over your entire environment. An attack on your identity provider can compromise every application and user in your organization simultaneously.
Traditional incident response playbooks focus on containing network segments and isolating endpoints. Identity incidents require containing access—which means understanding who has access to what, how credentials propagate across systems, and how to revoke access without causing a business-crippling outage.
The Identity Incident Response Framework
Phase 1: Detection and Initial Assessment
Identity incidents manifest through several detection channels:
Identity Threat Detection and Response (ITDR) Alerts. Modern ITDR platforms monitor identity infrastructure for anomalous authentication patterns, configuration changes, and attack techniques targeting identity stores.
SIEM Correlation Rules. Authentication anomalies, impossible travel scenarios, credential stuffing patterns, and unusual privilege usage trigger alerts in security information and event management systems.
User Reports. Employees noticing account lockouts, unfamiliar MFA prompts, or sessions they did not initiate often provide the earliest indication of credential compromise.
Third-Party Notifications. Threat intelligence feeds, dark web monitoring services, and vendor breach notifications may alert you to compromised credentials before they are used in your environment.
Initial Assessment Checklist:
- What type of identity incident is this? (Credential compromise, privilege escalation, identity infrastructure attack, insider threat)
- How many identities are potentially affected?
- What is the privilege level of the affected identities?
- Is the incident active or historical?
- What systems and data are potentially exposed?
- Is there evidence of lateral movement?
Phase 2: Containment
Containment for identity incidents differs fundamentally from network containment. You cannot simply isolate a subnet—you must contain access across every system the compromised identity can reach.
Immediate Containment Actions (First 30 Minutes):
For Compromised User Credentials:
- Disable the affected account immediately
- Terminate all active sessions (not just future authentications—kill existing sessions)
- Revoke all OAuth tokens, API keys, and refresh tokens associated with the identity
- Reset the account password and MFA enrollment
- Check for persistence mechanisms: mail forwarding rules, delegated access, registered devices, application consent grants
For Compromised Privileged Credentials:
- All of the above, plus:
- Rotate all credentials accessible from the compromised privileged session
- Review recent administrative actions for unauthorized changes
- Check for new accounts created, permissions modified, or security settings changed
- Verify integrity of identity infrastructure components (AD, IdP, certificate authorities)
- Engage your PAM team to review session recordings if available
For Identity Infrastructure Attacks:
- Isolate the affected identity infrastructure component if possible without causing widespread outage
- Activate your break-glass accounts (these should bypass the potentially compromised infrastructure)
- Engage identity infrastructure specialists immediately
- Begin integrity verification of the identity store (directory, IdP database, federation trusts)
- Assume all credentials issued by the compromised infrastructure may be affected
Extended Containment (Hours 1-4):
- Implement conditional access policies restricting authentication to known devices and locations for affected user populations
- Enable enhanced logging on all identity infrastructure components
- Activate step-up authentication requirements for sensitive applications
- Notify affected business units of potential access disruptions
- Brief executive leadership on incident scope and containment status
Phase 3: Investigation and Forensics
Identity forensics requires examining multiple evidence sources across your identity ecosystem:
Authentication Logs. Analyze authentication logs from your identity provider, on-premises Active Directory, cloud directories, VPN concentrators, and application-level authentication systems. Look for:
- Authentication from unusual locations or IP addresses
- Authentication at unusual times
- Authentication using deprecated protocols (NTLM, legacy basic auth)
- Failed authentication attempts preceding successful ones (credential guessing)
- MFA bypass or MFA fatigue patterns
Directory and Configuration Logs. Examine changes to your identity infrastructure:
- New user accounts or service principals created
- Permission changes, role assignments, or group membership modifications
- Federation trust changes or new identity provider configurations
- Conditional access policy modifications
- Audit log tampering or deletion attempts
Application Access Logs. For each system the compromised identity could access:
- What data was accessed, modified, or exfiltrated?
- Were any application-level privileges escalated?
- Were any application configurations changed?
- Were any integrations or API connections established?
Token and Session Analysis. Investigate the token lifecycle:
- What OAuth tokens or SAML assertions were issued during the compromise window?
- Were any tokens used to access systems beyond the initially compromised application?
- Are there dormant tokens that could be used for future access?
Forensic Timeline Construction. Build a minute-by-minute timeline of the incident:
- Initial compromise (how was the credential obtained?)
- First use of the compromised credential
- Reconnaissance activity (what did the attacker look at?)
- Privilege escalation (did they elevate their access?)
- Lateral movement (what other systems did they access?)
- Objective actions (what was the attacker's goal?)
- Persistence establishment (did they create backdoor access?)
- Detection (when and how was the incident discovered?)
Phase 4: Eradication
Eradication in identity incidents means eliminating all attacker access and persistence:
Credential Rotation. Reset credentials for all affected and potentially affected identities. For privileged accounts, this includes service account passwords, API keys, certificates, and secrets stored in vaults.
Persistence Removal. Methodically remove all persistence mechanisms:
- Delete unauthorized user accounts and service principals
- Remove malicious mail forwarding rules and inbox delegates
- Revoke unauthorized OAuth application consent grants
- Remove unauthorized devices from identity registration
- Delete unauthorized federation trusts or identity provider configurations
- Remove unauthorized conditional access policy exceptions
Infrastructure Integrity Verification. For incidents targeting identity infrastructure:
- Verify Active Directory replication integrity
- Check for unauthorized schema extensions
- Validate certificate authority certificate chain integrity
- Confirm identity provider configuration matches known-good baselines
- Verify no unauthorized changes to SAML/OIDC configurations
Secret Rotation. Rotate all secrets that may have been exposed:
- Application secrets and API keys
- Database connection strings
- Encryption keys accessible through the compromised identity
- Service account credentials
- Certificate private keys
Phase 5: Recovery
Restore Access Safely. Re-enable affected accounts with enhanced security controls:
- Require fresh MFA enrollment from a verified, trusted device
- Implement step-up authentication for sensitive operations for 30-90 days
- Apply conditional access restrictions limiting access to corporate-managed devices and known locations temporarily
- Enable enhanced monitoring for restored identities
Validate Security Controls. Before declaring the incident resolved:
- Confirm all unauthorized access has been removed
- Verify all credentials have been rotated
- Validate monitoring and alerting is functioning correctly
- Confirm break-glass procedures are tested and working
- Verify backup and recovery procedures for identity infrastructure
Communication. Notify all relevant stakeholders:
- Executive leadership: incident summary, business impact, remediation status
- Legal and compliance: regulatory notification requirements, evidence preservation
- Affected users: required actions (password resets, MFA re-enrollment)
- Third parties: if the incident affected partner or vendor access
- Regulators: if required by applicable regulations (GDPR 72-hour notification)
Phase 6: Post-Incident Review
Conduct a blameless post-incident review within two weeks. Focus on:
- Detection effectiveness: How quickly was the incident detected? What detection gaps existed?
- Containment speed: How quickly was the attacker's access terminated? What slowed containment?
- Investigation completeness: Were all evidence sources available? Were there logging gaps?
- Eradication thoroughness: Was all persistence removed? How was this verified?
- Recovery efficiency: How quickly was normal operations restored? What caused delays?
Update your playbook based on lessons learned. Every identity incident should make your response faster and more effective for the next one.
Real-World Examples
Golden SAML Attack Response. An organization detected anomalous authentication tokens in their cloud environment that bypassed multi-factor authentication. Investigation revealed that attackers had compromised the SAML token signing certificate, allowing them to forge authentication tokens for any user. Containment required rotating the SAML signing certificate—which invalidated all existing sessions and required every user to re-authenticate. The investigation took three weeks, during which the team discovered the attackers had maintained access for over four months.
MFA Fatigue Campaign. A targeted MFA fatigue attack against a senior executive resulted in the executive approving a push notification at 2 AM to stop the bombardment. The attacker used the compromised session to access the executive's email, identify financial processes, and initiate a fraudulent wire transfer. Detection came from the financial team noticing an unusual transfer request. Response required immediate account lockout, session termination, email audit for data exposure, and financial fraud team engagement.
Service Account Credential Leak. A developer accidentally committed a service account credential to a public GitHub repository. The credential provided access to the organization's CI/CD pipeline, which in turn had deployment access to production systems. Automated scanning detected the exposure within 15 minutes, but the credential had already been cloned by multiple actors. Response required immediate credential rotation, audit of all CI/CD pipeline activity during the exposure window, and verification that no unauthorized deployments had occurred.
Implementation Tips
Pre-build your response teams. Identify and train specific individuals for identity incident response before an incident occurs. Include IAM engineers, directory administrators, application owners, and security analysts.
Maintain a current identity asset inventory. You cannot respond effectively if you do not know what systems the compromised identity can access. Maintain real-time visibility into identity-to-entitlement mappings.
Test your playbook quarterly. Conduct tabletop exercises simulating identity incidents. Include scenarios for credential compromise, privilege escalation, and identity infrastructure attacks. Measure response time and identify gaps.
Invest in ITDR tooling. General-purpose SIEM solutions often lack the specialized detection logic needed for identity attacks. Purpose-built ITDR platforms provide deeper visibility into identity infrastructure and faster detection of identity-specific attack techniques.
Establish break-glass procedures. Maintain emergency access accounts that bypass your primary identity infrastructure. These accounts should be secured with hardware tokens, stored in a physical safe, and tested monthly to ensure they work when needed.
Common Mistakes
Resetting credentials without killing sessions. Changing a password does not invalidate existing sessions or tokens. Attackers with active sessions can continue operating even after a password reset. Always terminate sessions and revoke tokens simultaneously with credential reset.
Assuming the scope is limited. Identity incidents almost always have broader scope than initially apparent. A compromised credential is rarely used against a single system. Investigate lateral movement aggressively.
Neglecting persistence mechanisms. Attackers establish persistence through OAuth app registrations, mail forwarding rules, registered devices, and delegated access. If you only reset the password without removing these mechanisms, the attacker retains access.
Slow escalation. Identity incidents affecting privileged accounts or identity infrastructure should be escalated immediately. Treating a compromised domain admin like a routine phishing incident gives the attacker time to establish deeper persistence.
Insufficient logging. Many organizations discover during an identity incident that they lack the logs needed for effective investigation. Ensure authentication logs, directory change logs, and application access logs are retained for at least 12 months.
Conclusion
Identity incident response is a specialized discipline that requires specific skills, tools, and procedures beyond what general-purpose incident response plans provide. The unique characteristics of identity incidents—their speed, their potential scope, and their cascading nature—demand purpose-built playbooks, trained response teams, and continuous practice.
Organizations that invest in identity incident response capabilities before an incident occurs will contain breaches faster, minimize data exposure, and recover operations more quickly. Build your playbook, train your team, test your procedures, and maintain the detection and forensic capabilities needed to respond effectively when identity incidents inevitably occur.
Frequently Asked Questions
How quickly should we be able to contain an identity incident? Target 30 minutes for initial containment (account disable, session termination, token revocation) for a single compromised identity. For incidents affecting identity infrastructure, target 2-4 hours for initial containment, acknowledging that broader containment may cause significant business disruption.
Should we notify affected users immediately during an active incident? Delay user notification until initial containment is complete to avoid alerting the attacker. Once containment is confirmed, notify users promptly with clear instructions on required actions (MFA re-enrollment, password reset, suspicious activity review).
How do we investigate an identity incident when our logging infrastructure may be compromised? This is why out-of-band logging is critical. Maintain copies of identity logs in a separate security data lake that is not accessible through the same administrative credentials as your primary infrastructure. If you suspect log tampering, rely on these out-of-band copies.
What regulatory notification obligations apply to identity incidents? This varies by jurisdiction and industry. GDPR requires 72-hour notification for personal data breaches. HIPAA requires notification within 60 days. PCI-DSS requires immediate notification to card brands. Consult your legal team and maintain a pre-built notification matrix for each applicable regulation.
How do we handle identity incidents involving federated partners? Immediately notify the federated partner of the suspected compromise. Consider temporarily disabling the federation trust if the partner's identity infrastructure may be compromised. Coordinate investigation across both organizations and review the shared responsibility model in your federation agreement.
Share this article