Having a retainer with an incident response team or a pre-approved external signature does not amount to being ready. Operational preparation is the difference between someone taking a call and that intervention being effective in the early hours, when every lost minute allows the attacker to deepen his access and erase traces. In many real incidents, dead times are not caused by the absence of plans, but by practical friction: accounts that do not exist, approvals that should be asked for hot or compromised communication channels.
The priority in the early hours is not absolute control but visibility. No identity visibility- who started session, what tokens were issued, what privileged accounts have been used -, any containment becomes conjecture. Modern attackers are increasingly relying on credentials, legitimate sessions and misconfigured roles, so without access to identity providers, SSO, directories and authentication records, the investigation starts to tempt.

Access to the cloud and endpoint remains critical, but its value falls if it disconnects from the identity context. In cloud environments, many malicious actions seem normal: called legitimate API, configuration changes or service account abuse. The telemetry of endpoint and the control log plane they are perishable; if they are not captured and reviewed quickly, the evidence disappears. That's why the retainers must include preconfigured sleeping accounts with the appropriate permissions and quick mechanisms to activate them.
Logs retention times are a frequent operating error. Designing retention to save costs or only meeting audits can destroy the ability to rebuild the history of an attack. A practical research window should be much larger than the usual two weeks; 60-90 days is a reasonable objective for many scenarios, although the real need depends on the risk and maturity of the environment. If the records are overwritten or fragmented between silos, the containment decisions are made with incomplete evidence.
An account or role without the ability to activate instantly is useless. Operational preparation requires that emergency accounts exist, that MFA registration is completed and that the procedure for giving access is a known and tested action, not a new workflow in the midst of chaos. The activation must function as a switch: controlled, reproducible and fast.
Technical security fails if communication is compromised. In case of intrusion, it must be assumed that corporate mail, chats and internal tools may be exposed. Therefore, needs an off-band communication channel preconfigured, independent of corporate domain and tested with the response signature. This channel should allow to share sensitive information without risk of filtration to the attacker.
In addition to channels and access, a clear operational authority is needed. It is not enough to have a list of contacts; it requires a person with coordination responsibility who can make technical decisions and maintain the focus. The incident manager must be defined, accessible and practiced in exercises, acting as a link to the external signature to avoid contradictory instructions and delays.
Administrative barriers such as background checks or legal approvals are legitimate, but poorly placed when required during the crisis. These verifications should be completed in the onboard phase of the retainer. If decisions on access to production or regulated data are left for the time of the incident, the response slows down. Everything sensitive must be resolved before day zero.
The final preparation test is practical: can your organization enable a response account and recover authentication logs in less than an hour? Can a third party consult EDR telemetry with 30 days of history and the IMS with 90 days? If the response generates hesitation, then the organization has documentation, not capacity. The actual tests - tabletops and exercises involving legal, IT, business and the retainer firm - bring to light the friction that will fail in production.

There are additional operational risks that rarely appear in slides but kill recovery: accessible backups with the same committed credentials, outdated asset inventories or isolation policies that no one is allowed to run hot. A proven uninsulated backup is not recovery; it is one more target for the attacker. Verify restorations, segmentation and autonomy of backups should be part of the zero day check.
Convert a retainer to capacity requires prior work: creating sleeping accounts into identity, EDR, cloud and IMS; validating roles and MFA; establishing and practicing a secure communication channel; agreeing the authority to declare incidents and grant temporary access; and testing the complete activation with the external signature. To guide this practice, the community and standards provide useful reference frameworks, such as the NIST incident response guide NIST SP 800-61 and knowledge of adverse techniques in MITRE ATT & CK MITRE ATT & CK which can help prioritize telemetry and controls.
In short, real preparation is not a contract or a document: it is the sum of pre-incident operational decisions. The organizations that earn time in front of the attackers are the ones that have done the dirty work before the emergency: created accounts, proven channels, authorized roles and exercises that reveal what really fails. If your team is now unable to answer the basic operational questions without saying "we will resolve it during the incident," the immediate priority must be to close those gaps before the zero day arrives.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...