1. Purpose of This Guide
This artefact proves that your organisation actively trains staff to recognise and respond to phishing, instead of just telling them “be careful” and hoping for the best.
Under PDPA Data Protection Essentials Clause 7.4, organisations must run phishing simulation exercises regularly and document the outcomes.
The After-Action Report shows:
-
The simulation actually took place
-
Staff awareness was tested in a realistic way
-
Lessons were identified and acted on
Auditors want to see learning and improvement — not perfect scores.
2. What You Will Submit
You will upload one completed Phishing Simulation After-Action Report.
It should include:
-
A written report (document or PDF)
-
Details of the phishing simulation exercise
-
Metrics from the simulation (e.g. clicks, reports)
-
Observations on staff behaviour
-
Clear recommendations for improvement
This is usually generated from:
-
Your phishing simulation tool (exported metrics + write-up), or
-
A completed internal template
3. How to Collect / Generate This Evidence
Coming soon: StrongKeep customers will be able to use the built-in phishing training platform to generate the reports.
Step 1: Run a phishing simulation
Use your phishing simulation platform (or email tools) to send a simulated phishing email to staff.
Examples:
-
Fake password reset email
-
Suspicious invoice attachment
-
Fake Microsoft or Google login alert
Keep it realistic, but safe.
Step 2: Capture simulation details
After the exercise, record:
-
Exercise date
-
Scope (number of users targeted)
-
Type of phishing scenario used
Step 3: Collect key metrics
Your report should clearly show results such as:
-
Click rate
-
Report rate (who reported the email)
-
Any credential submission (if applicable)
Screenshots or exported summaries from the tool are acceptable.
Step 4: Document observations and lessons
Add a short analysis covering:
-
How well staff recognised the phishing attempt
-
Common mistakes or patterns
-
Whether reporting processes were followed
Then list clear recommendations, such as:
-
Additional training for certain teams
-
Improving phishing reporting instructions
-
Running simulations more frequently
4. Evidence Format
-
Accepted file types: PDF, DOCX
-
Recommended naming format:
YourCompanyName_PhishingSimulation_AAR_YYYY-MM-DD.pdfExample:
AcmeCorp_PhishingSimulation_AAR_2025-07-01.pdf
5. What “Good” Looks Like
A strong Phishing Simulation After-Action Report includes:
-
Visible Element: Simulation date and scope
Why it matters: Confirms the exercise was conducted and who was involved. -
Visible Element: Measurable results (clicks, reports)
Why it matters: Demonstrates real testing, not theoretical training. -
Visible Element: Observations on staff behaviour
Why it matters: Shows understanding of human risk, not just numbers. -
Visible Element: Practical improvement actions
Why it matters: Proves continuous improvement of staff awareness.
If an assessor can clearly see what happened, what you learned, and what you’ll change, you’re winning.
6. Tips from Sir Stonk 🗡️
-
Don’t name and shame. Focus on trends and learning, not individual blame.
-
Even high click rates are acceptable — as long as you document follow-up actions.