The most damaging ransomware attacks of 2025 shared a common thread: attackers didn’t exploit sophisticated vulnerabilities but instead used stolen credentials and ungoverned identities to walk through the front door.
This blog is part of a three-part series exploring the role of Identity Governance and Administration (IGA) across the full lifecycle of a ransomware attack – before, during, and after the incident.
Part 1: Before a Ransomware Attack: How IGA Shrinks Your Identity Attack Surface
Part 2: During a Ransomware Attack: How IGA Enables Rapid Response
Part 3: After a Ransomware Attack: How IGA Enables Clean Recovery and Post-Incident Hardening (this blog)
Restoring systems does not restore trust. Backups preserve the same ungoverned access that attackers exploited, emergency credentials outlast the crisis, and forensic teams cannot reconstruct what happened without a continuous identity record. Recovery without governance is just preparation for the next attack. This post explains how identity governance transforms recovery from a blind rebuild into a process that prevents recurrence.
Part 1 of this series examined the M&S breach of April 2025, where a single social engineering call to a third-party service desk gave attackers access to the system controlling user credentials across the organization. Without identity visibility, containment became a full operational shutdown.
By August of that year, M&S had restored full online operations. The company spent the intervening months rebuilding core identity infrastructure, resetting all customer account passwords, and engaging external specialists to verify the environment was clean. M&S is not unusual. More than a third of organizations take longer than a month to recover from a ransomware attack, and that figure captures only system restoration. The identity forensics, access cleanup, and regulatory response extend far beyond.
Most recovery plans treat ransomware as a backup and restore problem, built on the assumption that if systems are restored and data is intact, the business is recovered. But backups preserve the identity environment as it was, and that includes every condition the attacker exploited. The orphaned account used to gain entry, the over-privileged service account that enabled lateral movement, the third-party credential that should have been revoked months earlier. All of it is faithfully restored alongside the data.
This is why organizations that pay the ransom so often get hit again. Without identity governance intelligence to distinguish between legitimate access and the restored ungoverned conditions that made the breach possible, organizations simply rebuild the environment the attacker exploited.
A governed environment maintains an authoritative record of what access should exist, mapped to roles, policies, and business context. That record becomes the reference point for recovery. Instead of restoring whatever the backup contains and hoping for the best, recovery teams can validate the restored environment against the governed state: identifying accounts that should no longer exist, permissions that exceed policy, and access relationships that were never authorized.
During a ransomware response, security teams grant emergency access to incident responders, forensic consultants, IT staff performing rebuilds, and vendors supporting recovery. Containment and recovery require elevated privileges, temporary accounts, and approval bypasses that would never pass a normal governance review.
But once the crisis passes, all of that emergency access needs to be reviewed and revoked. Without a governed process to ensure that happens, the recovery itself becomes a source of new risk. Response team accounts with admin privileges remain active long after the engagement ends. Vendor access lingers without an expiration date. Internal staff retain elevated privileges they no longer require. Manual overrides stay in place because no process exists to wind them down.
Governance workflows address this directly. Every emergency access grant is captured with a defined expiration and clear ownership. Post-incident certification campaigns review all access changes made during the incident window. Automated expiration policies revoke emergency access on schedule, without relying on someone to remember. The organization does not emerge from one incident carrying the seeds of the next.
Once containment is complete, the board, regulators, insurers, and legal counsel all need to understand the scope and impact of the breach. Since attackers traverse environments using compromised identities, the forensic record is fundamentally an identity record. Organizations need to demonstrate what the attacker accessed, how they moved through the environment, what data those accounts could reach, what changed during the incident and who authorized those changes.
Without a unified identity audit trail, teams must piece together access records from dozens of disconnected systems, where gaps in logging mean gaps in the forensic record.
Change Healthcare, whose containment challenges were explored in Part 2 of this series, offers the clearest example of what fragmented and inadequately governed identity records cost an organization during recovery. After the company severed connectivity to contain the breach, the forensic effort to determine who had access to what across a distributed identity environment took nearly eleven months to reach “substantially complete ” status, with the total number of affected individuals revised upward multiple times to 192.7 million.
With a continuous identity audit trail, forensic teams work from a single authoritative record: who had access to what, when it was granted or changed, and by whom. Regulators receive compliance-ready reporting with documented evidence rather than best-effort estimates.
Technical root cause analysis identifies the vulnerability exploited and the attack path taken. That analysis is essential for the security team, but it rarely gives the board what they need: a clear explanation of why this happened and what must change.
Post-incident analysis should translate technical findings into governance terms that leadership can act on. An attacker who gained entry through an orphaned contractor account did not exploit “stolen credentials.” They exploited a gap in the Joiner-Mover-Leaver process that left a defunct account active and accessible. An attacker who moved laterally across multiple cloud environments did not simply achieve “lateral movement.” They exploited a certification gap that allowed excessive permissions to accumulate unchecked. An attacker who leveraged a service account with no owner, full admin privileges, and no MFA did not achieve “privilege escalation.” They exploited a non-human identity governance gap.
The board does not need to understand how ransomware encrypts virtual machines. They need to understand that a contractor account that should have been deprovisioned six months ago held admin privileges across three cloud environments and had never been included in an access review. That is the analysis that shifts the conversation from technical remediation to governance investment, authorizes budget, and prevents recurrence.
Barracuda’s 2025 Ransomware Insights Report found that nearly a third of ransomware victims were hit twice or more within twelve months, and organizations that paid were more likely to be targeted again. Post-incident hardening must address the specific gaps the incident revealed. In a governed environment, access policies, role definitions, and segregation of duties rules are updated to close the paths the attacker used. Over-privileged roles get redesigned, toxic access combinations that enabled escalation are blocked with new segregation of duties rules, and approval workflows that waved through risky exceptions get tightened.
Even when organizations tighten access controls after a breach, the focus tends to fall on human employee accounts while non-human identities and third-party access remain undergoverned, and those are exactly the categories attackers target next. Credential rotation enforced on schedule, ownership assigned and certified, access scoped to business need. Third-party accounts operate under time-bound governance tied to active engagement status, not annual checklists.
The most significant shift in post-incident hardening is the move from periodic access reviews to continuous analysis. Annual or quarterly certification cycles create windows in which risk accumulates unseen. Continuous analytics surface anomalies, privilege drift, and risky combinations as they develop. Post-incident hardening is the moment organizations stop reviewing access on a schedule and start governing it continuously.
This series has examined identity governance across the full lifecycle of a ransomware attack. Part 1 explored how governance shrinks the attack surface. Part 2 examined how governance enables surgical containment. This post has shown how governance transforms recovery from a blind rebuild into a governed process that prevents recurrence.
The organizations that recover strongest from ransomware are not the ones with the fastest backup restore times. They are the ones that can verify their identity environment is clean, reconstruct what happened with confidence, and feed incident lessons directly into their governance programs so the same attack path closes permanently.
That capability does not appear in the moment of crisis. It is built continuously, tested under pressure, and applied with discipline when it matters most.
Ready to see how identity governance strengthens your ransomware resilience? Schedule a demo to see how Omada Identity Cloud delivers the visibility, governance, and intelligence needed to recover with confidence and prevent recurrence.
FREQUENTLY ASKED QUESTIONS
Backups can restore systems and data, but they also restore the same identity conditions attackers exploited, such as orphaned accounts, over-privileged service accounts, and third-party credentials that should have been revoked. Without an authoritative reference for what access should exist, teams can rebuild an environment that remains unsafe and prone to repeat attacks.
Identity Governance and Administration (IGA) maintains an authoritative record of what access should exist, mapped to roles, policies, and business context. During recovery, teams can validate restored systems against that governed state to find accounts that should not exist, permissions that exceed policy, and access relationships that were never authorized.
Ransomware response often requires elevated privileges, temporary accounts, and approval bypasses for responders, consultants, IT staff, and vendors. Governance workflows capture each emergency grant with ownership and a defined expiration, then use post-incident certification and automated expiration policies to review and revoke access changes made during the incident window.
After containment, boards, regulators, insurers, and legal counsel need a clear account of what was accessed, how movement occurred, what data was reachable, and what changed during the incident and who approved it. A continuous identity audit trail provides a single authoritative record of access and changes, which supports compliance-ready reporting instead of assembling partial logs from disconnected systems.
Post-incident hardening updates access policies, role definitions, and segregation of duties rules to close the specific paths used during the incident. It should also govern non-human identities and third-party access through credential rotation, clear ownership, certification, and time-bound access tied to active engagement. Continuous analytics can surface privilege drift and risky combinations as they develop, rather than waiting for periodic reviews.
FEATURED RESOURCES
The most damaging ransomware attacks of 2025 shared a common thread: attackers didn’t exploit sophisticated vulnerabilities but instead used stolen credentials and ungoverned identities to walk through the front door.
In this blog, we explain how important containment speed is when ransomware strikes, and how it determines whether your organization will experience either a six-hour incident or a six-week shutdown.
Enterprises now face attackers who log in with stolen credentials, abused tokens, and excessive privileges, making identity the real perimeter and an auditable business risk.