|
| 1 | +# Security Policy |
| 2 | + |
| 3 | +1. [Reporting security problems to CloudGraph](#reporting) |
| 4 | +2. [Security Point of Contact](#contact) |
| 5 | +3. [Incident Response Process](#process) |
| 6 | + |
| 7 | +<a name="reporting"></a> |
| 8 | +## Reporting security problems to CloudGraph |
| 9 | + |
| 10 | +**DO NOT CREATE AN ISSUE** to report a security problem. Instead, please |
| 11 | +send an email to [email protected] |
| 12 | + |
| 13 | +<a name="contact"></a> |
| 14 | +## Security Point of Contact |
| 15 | + |
| 16 | +The security point of contact is Tyler Dunkel. Tyler responds to security |
| 17 | +incident reports as fast as possible, within one business day at the latest. |
| 18 | + |
| 19 | +In case Tyler does not respond within a reasonable time, the secondary point |
| 20 | +of contact is [Tyson Kunovsky](https://github.com/orgs/cloudgraphdev/people/kunovsky). |
| 21 | + |
| 22 | +If neither Tyler nor Tyson responds then please contact [email protected] |
| 23 | +who can disable any access for the CloudGraph CLI tool until the security incident is resolved. |
| 24 | + |
| 25 | +<a name="process"></a> |
| 26 | +## Incident Response Process |
| 27 | + |
| 28 | +In case an incident is discovered or reported, CloudGraph will follow the following |
| 29 | +process to contain, respond and remediate: |
| 30 | + |
| 31 | +### 1. Containment |
| 32 | + |
| 33 | +The first step is to find out the root cause, nature and scope of the incident. |
| 34 | + |
| 35 | +- Is still ongoing? If yes, first priority is to stop it. |
| 36 | +- Is the incident outside of my influence? If yes, first priority is to contain it. |
| 37 | +- Find out knows about the incident and who is affected. |
| 38 | +- Find out what data was potentially exposed. |
| 39 | + |
| 40 | +One way to immediately remove all access for CloudGraph is to uninstall CloudGraph globally and/or locally using |
| 41 | +`npm uninstall -g @cloudgraph/cli` && `npm uninstall @cloudgraph/cli` |
| 42 | + |
| 43 | +### 2. Response |
| 44 | + |
| 45 | +After the initial assessment and containment to out best abilities, CloudGraph will |
| 46 | +document all actions taken in a response plan. |
| 47 | + |
| 48 | +CloudGraph will create an RCA (Root Cause Analysis) document in the [CloudGraph documentation site](https://docs.cloudgraph.dev/overview) that describes what happened and what was done to resolve it. |
| 49 | + |
| 50 | +### 3. Remediation |
| 51 | + |
| 52 | +Once the incident is confirmed to be resolved, CloudGraph will summarize the lessons |
| 53 | +learned from the incident and create a list of actions CloudGraph will take to prevent |
| 54 | +it from happening again. |
| 55 | + |
| 56 | +### Keep permissions to a minimum |
| 57 | + |
| 58 | +The CloudGraph CLI tool uses the least amount of access to limit the impact of possible |
| 59 | +security incidents, see [README - How It Works](https://github.com/cloudgraphdev/cli#how-it-works). |
| 60 | + |
| 61 | +### Secure accounts with access |
| 62 | + |
| 63 | +The [CloudGraph GitHub Organization](https://github.com/cloudgraphdev) requires 2FA authorization |
| 64 | +for all members. |
| 65 | + |
| 66 | +### Critical Updates And Security Notices |
| 67 | + |
| 68 | +We learn about critical software updates and security threats from these sources |
| 69 | + |
| 70 | +1. GitHub Security Alerts |
| 71 | +2. [Snyk open source vulnerability dectection](https://snyk.io/product/open-source-security-management/) |
| 72 | +3. GitHub: https://githubstatus.com/ & [@githubstatus](https://twitter.com/githubstatus) |
0 commit comments