Incident Reponse Playbook

TODO

When to use this

Whenever a core team (listed below) realizes that the response to an incident requires more than one team to resolve. We expect this to be used mostly in security-related incidents (account compromise, severe security vulnerability, etc) but it is probably useful beyond that.

Following the process is expected to structure the response, figure out who is available and let volunteers plan their availability. The document also spells out some general expectations.

This document is informational for any beyond the incident responders and likely not directly applicable.

Prework

NOTE: ONLY if you are a member of the "Core response" teams listed below.

Step 1: Identify the teams involved

NOTE: All teams are listed with their private alias that is not accessible to the public.

Core response teams:

Also think about involving other teams (depends on the incident):

Think about involving these for awareness - likely without much detail:

Step 2: Establish a communication channel

Step 3: Create a Salsa project for the response

Step 4: Figure out workstreams

This will be very incident-dependent, but the following might help you: