On 2 March 2025 our SOC detected that an attacker signed in to the support@optimsync.com mailbox via stolen OAuth refresh tokens, giving read-only access to a CSV file containing 2 000 patient records (name, date-of-birth, outpatient diagnosis code). The session was terminated in 23 minutes; no financial or SSN data were present.
Post-incident review (E_RCA.pdf) documents root cause (token theft), fixes (OAuth token hardening), and scheduled MFA rollout audit.
5 Lessons learned & continuous improvement
Technical – Enable Conditional Access token protection for all privileged mailboxes; completed 5 Apr 2025.
Process – Add explicit OAuth-token theft scenario to annual tabletop catalogue.
Testing – Next full-scale drill scheduled Q1 2026; results to be logged in IR metrics dashboard.Periodic testing and metric tracking satisfy SOC 2 CC7.5’s “periodically evaluates incidents” requirement.
6 Evidence-bundle index (to upload with this document)
Title
Title
File name
Contents
A_RiskAssessment.pdf
Signed four-factor worksheet (HIPAA § 164.402)
B_IndividualNotice.pdf
Redacted sample letter to affected individuals (HIPAA § 164.404)