Identification of potential human factors and the role they might have played; Analysis and causal chain of human factors in the scenario. Look for the BEHAVIOR and motivations that led to the flaws, not merely the existence of technical flaws. We are not assessing technology, we are investigating human behavior…
https://www.onelogin.com/blog/top-3-mistakes-data-breaches
https://krebsonsecurity.com/2017/06/onelogin-breach-exposed-ability-to-decrypt-data/