Skip to content

Latest commit

 

History

History
31 lines (20 loc) · 2.05 KB

Processes.md

File metadata and controls

31 lines (20 loc) · 2.05 KB

Public Processs

Any process or control which is of interested to our clients and customers is documented here. For ones that exist for purely internal benefit, those are documented only in our internal knowledge base.

Security incident response process

  1. Assemble - we pull in the right people with th right skills.

  2. Detect - we ascertain the infiltration route and investigate the opportunities to shut down potential routes of ingress. To do this we may review the following:

  • Access by Users, system administrators, network administrators, security staff, and others from within your organization reporting signs of a security incident
  • SIEMs or other security products generating alerts based on analysis of log data
  • Application Logs and Cloud Logs
  • Network devices and endpoints
  • Cloud services
  • Applications
  1. Contain - Implement blocks to stop additional vulnerable access.

  2. Assess - We meet and review what happened and the steps taken to understand the full impact and the possible damage.

  3. Adjust - After reving and handling the security incident, we continue the discussion by adding future protections to prevent similar vulnerabilities.

  4. Notify - Once there is no longer a current threat, and future threats have been ruled out, we continue by notifying all affected parties. Notifications follow our public notification standards.

  5. Innovate - After eliminating any near time needs, we move on to understand not only how to prevent other vulnerabilities in the same space, but how to improve the community as a whole via education and solutions to prevent other attacks.

  6. Retrospect - We review this process and seek to make ongoing improvements.

Addressing incidents

All incidents will be addressed as the primary responsibility of the company until the incident response process has been completed. We take the utmost care to ensure that any all data has been verified and secured before moving on.

All security incidents will be reported in our Slack Workspace, and updates will be made as they are available.