Skip to content

Instantly share code, notes, and snippets.

@twinelabs
Last active February 26, 2018 03:44
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save twinelabs/9f9878cce1dd902dd25cf807b0b0c089 to your computer and use it in GitHub Desktop.
Save twinelabs/9f9878cce1dd902dd25cf807b0b0c089 to your computer and use it in GitHub Desktop.

Incident Response Plan

This document offers guidance for employees or incident responders who believe they have discovered or are responding to a security incident.

Escalation

Email to panic@twinelabs.com or a message to #panic should be used to notify the security team of run-of-the mill issues. Be a good witness. Behave as if you were reporting a crime and include lots of specific details about what you have discovered.

Severity

Low and Medium Severity

Issues meeting this severity are simply suspicions or odd behaviors. They are not verified and require further investigation. There is no clear indicator that systems have tangible risk and do not require emergency response. This includes suspicious emails, outages, strange activity on a laptop.

Email to panic@twinelabs.com or a message to #panic should be used to notify the security team of low or medium severity issues.

High Severity

High severity issues relate to problems where an adversary or active exploitation hasn’t been proven yet, and may not have happened, but likely to happen. This may include vulnerabilities with direct risk of exploitation, threats with risk or adversarial persistence on our systems (eg: backdoors, malware), malicious access of business data (eg: passwords, vulnerability data, payments information), or threats that put any individual at risk of physical harm.

High severity issues should include an email to panic@twinelabs.com with “Urgent” in the subject line, or a message to #security with “@channel incident” in the message to alert incident responders.

Critical Severity

Critical issues relate to actively exploited risks and involve a malicious actor. Identification of active exploitation is critical to this severity category.

Critical severity issues should involve a message to “@channel” in #security and #panic, as well as messages to the CEO (joseph@twinelabs.com) and CTO (nikhil@twinelabs.com). Continue escalation until you receive acknowledgement. Involvement of a crisis lead for public relations, a lawyer familiar with breach notification, and a “heads up” to our consultant response partners are highly recommended.

Unauthorized Client Data Access

By definition, the detection of unauthorized access of client data is a critical-severity incident. If unauthorized access is detected, the response team should make the client's security representatives aware of the breach, in addition to following the procedure outlined above under "Critical Severity."

Internal Issues

Issues where the malicious actor is an internal employee, contractor, vendor, or partner requires sensitive handling. Please contact the CEO and CTO directly and do not discuss with other employees. These are critical issues and must be pushed to follow up.

Compromised Communications

If there are IT communication risks, the New York team will announce an out of band solution within the office, and will communicate this to managers with directions over cell phones.

Incident responders (i.e. all engineers) must have Wickr messaging arranged.

Response Steps

For critical issues, the response team will follow an iterative response process designed to investigate, contain exploitation, remediate our vulnerability, and document a post-mortem with the lessons of an incident.

  1. CTO or CEO will determine if a lawyer be included and attorney client privilege between responders will begin.
  2. A central “War Room” will be designated.
  3. The following meeting will occur at regular intervals until the incident is resolved:

Breach Response Meeting — Agenda

  • Update Breach Timeline
  • New Indicators of Compromise
  • Investigative Q&A
  • Emergency Mitigations
  • Long Term Mitigations (including Root Cause Analysis)
  • Everything Else

We will Update a Breach Timeline with all known temporal data related to the incident. All Indicators of Compromise will be updated and shared among breach responders. The group will add new knowns and unknowns to the Investigative Q&A. A list of tactical Emergency Mitigations will be updated. A list of long term, post breach Long Term Mitigations will be updated. Once items related to response are covered, technical responders may leave the meeting and meta-topics (Everything Else) related to the breach are discussed (communications, legal issues, blog posts, etc) with leadership.

Response Team Members

Name Cell Number wickr
Ian 484-793-5515 iansibner
Nikhil 973-943-3223 nikhiltwine

Runbooks

To engineers: add links to runbooks that follow from vulnerability assessments / penetration tests here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment