OIA Autoimmune Scan Execution

Type: Execution Recipe Confidence: 0.85 Sources: 4 Verified: 2026-03-29

Purpose

This recipe executes an organizational autoimmune scan — systematically detecting where the organization's own compliance, approval, and control systems are being routinely bypassed. It produces a classified inventory of autoimmune patterns with severity scores and a friction point map distinguishing protective friction from paralyzing friction. [src1, src2]

Prerequisites

Constraints

Tool Selection Decision

Which approach?
├── Full SIEM access + interviews available
│   └── PATH A: Log Analysis + Interviews + Survey
├── IT admin logs + survey only
│   └── PATH B: Log Review + Survey
├── Survey + interviews only (no log access)
│   └── PATH C: Qualitative Only
└── Survey only (minimal access)
    └── PATH D: Survey-Only
PathToolsCostSpeedOutput Quality
A: FullSIEM + interviews + survey$0-$2004-5 daysExcellent
B: Logs + SurveyIT logs + survey tool$0-$1003-4 daysGood
C: QualitativeInterviews + survey$0-$2003-4 daysGood
D: Survey-OnlySurvey tool$0-$1002-3 daysAdequate

Execution Flow

Step 1: Compliance Bypass Detection

Duration: 4-8 hours · Tool: SIEM queries, IT admin logs

Query IT and security logs for split transactions, after-hours access, shadow IT, approval shortcuts, and exception request volume.

Verify: Pattern frequency quantified per department, at least 3 bypass categories analyzed. · If failed: Skip to Step 2 (interviews surface the same patterns qualitatively).

Step 2: Shadow Workaround Inventory

Duration: 1-2 days · Tool: 30-minute structured interviews (10-15 employees)

Interview employees stratified by department and level using structured friction diary: what rules they work around, what takes more effort than it should, what tools IT didn't set up. [src2]

Verify: > 80% of scheduled interviews completed, each department represented. · If failed: Supplement with anonymous online survey.

Step 3: Security Fatigue Assessment

Duration: 4-8 hours · Tool: IT security dashboard + anonymous survey

Measure MFA prompt frequency, approval backlog days, exception request volume, policy document read rates, password reset frequency. [src1]

Verify: Fatigue score calculated per department, > 60% survey response rate. · If failed: Extend survey window, executive sponsor sends reminder.

Step 4: Friction Point Mapping

Duration: 4-8 hours · Tool: Classification matrix

Classify each workaround as protective friction (prevents financial loss, legal liability, safety risk) or paralyzing friction (serves hierarchy without measurable risk mitigation). [src2, src3]

Verify: Each friction point classified with 2-analyst consensus. · If failed: Escalate ambiguous cases to client stakeholder.

Step 5: Severity Scoring & Report

Duration: 4-8 hours · Tool: Scoring rubric + report template

Score each pattern: low (inconvenience), medium (productivity loss), high (compliance risk), critical (legal/financial exposure). Produce prioritized inventory. [src3]

Verify: Top 10 patterns prioritized, all critical-severity patterns flagged. · If failed: Broaden interview scope or extend survey.

Output Schema

{
  "output_type": "autoimmune_scan_report",
  "format": "XLSX + PDF + JSON",
  "key_metrics": [
    {"name": "total_patterns", "description": "Total autoimmune patterns identified"},
    {"name": "critical_count", "description": "Patterns with critical severity"},
    {"name": "paralyzing_friction_pct", "description": "% of friction classified as paralyzing"},
    {"name": "avg_fatigue_score", "description": "Organization-wide security fatigue average (1-5)"}
  ]
}

Quality Benchmarks

Quality MetricMinimum AcceptableGoodExcellent
Patterns identified> 5> 10> 15
Survey response rate> 60%> 75%> 90%
Interview completion rate> 70%> 85%> 95%
Department coverage> 50%> 75%> 90%
Analyst classification agreement> 70%> 85%> 95%

If below minimum: Extend survey window, add interview slots, or broaden SIEM query scope.

Error Handling

ErrorLikely CauseRecovery Action
Low survey response (< 60%)Lack of trust or survey fatigueExecutive sponsor sends personal message, extend deadline
Interview cancellationsDiscomfort or scheduling conflictsOffer written response option, reschedule
SIEM access deniedIT security policyEscalate to sponsor, proceed qualitative only
No patterns foundQuestions too gentle or culture of silenceReframe around "efficiency improvements"
Critical pattern mid-scanActive compliance violationReport to sponsor within 24 hours, continue scan

Cost Breakdown

ComponentFree TierPaid TierAt Scale
Survey tool$0 (Google Forms)$50 (Typeform)$200 (SurveyMonkey)
Interview time$0$0$0
SIEM access$0 (client existing)$0$0
Total$0$0-$50$0-$500

Anti-Patterns

Wrong: Treating workarounds as misconduct

Approaching the scan as a compliance audit that punishes violators. Result: employees refuse to participate. [src4]

Correct: Frame as efficiency improvement

Shadow workarounds are symptoms of organizational friction, not employee failure. [src2]

Wrong: Classifying all bypasses as problems

Recommending more controls when the organization already has too many. [src3]

Correct: Distinguish protective from paralyzing friction

Remove paralyzing friction while strengthening protective friction.

Wrong: Running survey without executive air cover

Sending the survey without executive communication first. Result: employees assume it is a trap. [src1]

Correct: Executive sponsor sends first communication

Before any survey, have the sponsor explain purpose, anonymity guarantees, and non-punitive intent.

When This Matters

Use when an agent needs to detect and classify organizational autoimmune patterns. This is Step 4 of the OIA engagement lifecycle. Requires network analysis findings to target interviews. Output feeds into stress test design and the overall OIA health score.

Related Units