Secure Delivery Playbook
Equal ExpertsContact UsPlaybooks
  • Overview
  • Introduction
    • How is this different?
    • Security Engineers and Security Champions
  • Principles
  • Practices
    • Organise
      • Scaling Security
      • Vulnerability Management
      • Incident Response
      • Training
      • Compliance & Policy
      • Intelligence
    • Build
      • Inception
      • Stories & Epics
      • Security in the Pipeline
      • Periodic Review
    • Operate
      • Environment Provisioning
      • Security of the Pipeline
      • Security Testing in Production
      • Detection & Response
  • Contribute
    • Contributors
    • How to contribute
Powered by GitBook
On this page
  • Make security visible in the software catalogue
  • Conduct a post-mortem after security incidents
Export as PDF
  1. Practices
  2. Organise

Intelligence

PreviousCompliance & PolicyNextBuild

Last updated 5 years ago

Make security visible in the software catalogue

The organisation should provide a central view of all software products they create, including relevant metadata (e.g. owning team, deployed versions, links to operability dashboards, source repo, build jobs, etc.). This should be automatically kept up to date, preferably by pulling the information directly from the relevant systems (e.g. GitHub, Jenkins, Grafana, Kibana, deployment tooling, etc.).

Security Engineering should ensure that security tooling is integrated with the software catalogue or inventory so that teams can be easily informed of the security issues in their services and understand the issues they are accountable for. This also provides a high-level view of where the greatest risk is and which projects need more assistance from Security Engineering.

Conduct a post-mortem after security incidents

Security Engineering should ensure that blameless post-mortems are conducted after every security incident, involving representatives across the organisation. A post-mortem is a written record of an incident, its impact, the actions taken to mitigate or resolve it, the root cause(s), and the follow-up actions to prevent the incident from recurring.

The post-mortem should be shared within the organisation so that other teams can learn valuable lessons and to encourage a culture of openness and disclosure.

Examples of other companies that have done this publicly:

Gentoo GitHub admin compromise
GitHub DDoS attack
Homebrew GitHub personal access token leak
Parity hacked via security bug introduced during refactoring
Insider bitcoin theft from ShapeShift