Skip to content

First pass: tighten incident response template structure and build pipeline runbook#1

Open
frameworks-volunteer wants to merge 9 commits intodevelopfrom
matta/ir-template-tightening
Open

First pass: tighten incident response template structure and build pipeline runbook#1
frameworks-volunteer wants to merge 9 commits intodevelopfrom
matta/ir-template-tightening

Conversation

@frameworks-volunteer
Copy link
Owner

Summary

This PR is a first pass on the recently added Incident Response Template section.

The goal is not to expand the section broadly, but to make it clearer, tighter, and more operationally credible without adding filler or speculative content.

This pass focuses on three things:

  1. clarifying the distinction between framework guidance, templates, runbooks, and playbooks
  2. reducing a few over-absolute statements
  3. upgrading the weakest runbook in the set (build-pipeline-compromise) into something more responder-oriented

What changed

1) Clarified content taxonomy

Added concise framing so readers can understand what each layer is for:

  • incident-management/overview.mdx

    • clarifies that the section now contains both:
      • framework guidance
      • operational templates
  • incident-management/playbooks/overview.mdx

    • reframes playbooks as reference material, not drop-in internal operating procedures
    • points readers to the template/runbook sections for copy-and-adapt operational docs
  • incident-response-template/overview.mdx

    • clarifies that the broader incident-management pages explain concepts/practices
    • clarifies that the template section is intended to be copied/customized for internal use
    • distinguishes:
      • policy / roles / communications / contacts
      • templates
      • runbooks
  • incident-response-template/templates/overview.mdx

    • clarifies when to use templates vs runbooks vs policy pages
  • incident-response-template/runbooks/overview.mdx

    • clarifies that runbooks are operational procedures, distinct from framework playbooks and blank templates

2) Tightened a few absolute statements

  • incident-response-template/incident-response-policy.mdx

    • changed:
      • "Monitor for at least a week"
    • to:
      • "Monitor based on residual risk, blast radius, and incident type"
  • incident-response-template/roles-and-staffing.mdx

    • changed:
      • "These people should be reachable 24/7"
    • to:
      • "There should be a 24/7 escalation path to these people"

These changes are meant to make the guidance more realistic and less doctrinal.

3) Upgraded the build pipeline compromise runbook

incident-response-template/runbooks/build-pipeline-compromise.mdx was previously a thin stub. This PR upgrades it into a more credible example runbook by adding:

  • better identification criteria
  • scope questions
  • differentiation from adjacent incident classes
  • immediate actions that reflect actual responder priorities:
    • freeze pipeline
    • preserve evidence
    • rotate credentials by blast radius
    • stop trusting recent outputs
  • investigation questions focused on access path, permissions, credential exposure, and affected outputs
  • containment / recovery options:
    • rebuild from known-good commit using clean pipeline
    • rollback to last known-good release
    • keep service paused until trust is re-established
  • a verification gate before normal delivery resumes
  • a concise hardening checklist after the incident

What this PR does not do

Intentionally out of scope for this first pass:

  • broad content expansion
  • adding new Web3-specific runbooks just to fill gaps
  • renaming sections or restructuring the sidebar deeply
  • inventing protocol-specific operational steps without high confidence

I would rather leave gaps visible than fill them with weak or speculative guidance.

Why this scope

The Incident Response Template addition is already valuable, but right now it mixes:

  • framework/reference material
  • internal templates
  • runbooks

This first pass tries to make that structure easier to understand, while also strengthening one page that felt materially underdeveloped.

Follow-up ideas (not included here)

Possible future passes, if useful:

  • strengthen frontend-compromise and dependency-attack
  • add battle-tested Web3-native scenarios only where confidence is high
  • revisit naming/IA if the team wants clearer labels than the current playbook/runbook/template split

artemisclaw82 and others added 7 commits March 10, 2026 13:09
…nce#375)

* content(add): Zoom hardening guide for opsec/endpoint (closes security-alliance#135)

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>

* refactor: move Zoom hardening to guides, fix web portal settings paths

- Move zoom-hardening.mdx from opsec/endpoint/ to guides/endpoint_security/
- Update all settings paths to use Zoom web portal (zoom.us/profile/setting):
  - Remote control: Settings > Meeting > In Meeting (Basic) > Remote control
  - Screen sharing: Settings > Meeting > In Meeting (Basic) > Screen sharing
  - Waiting room: Settings > Meeting > Security > Waiting Room
  - Passcode: Settings > Meeting > Security > Require a passcode
  - Recording: Settings > Meeting > Recording > Automatic recording
  - Join before host: Settings > Meeting > Security
- Update vocs.config.ts sidebar (guides section)
- Revert opsec/endpoint to single Overview link

Addresses review feedback on PR security-alliance#375.

* content(zoom-hardening): split hardening checklist into Required and Optional sections

Required: Trail of Bits ELUSIVE COMET mitigations (disable remote control,
host-only screen sharing, deny accessibility permissions, browser-based Zoom,
SSO/OAuth, PPPC profiles/tccutil, remove desktop client).

Optional: general best practices (waiting rooms, passcodes, auto-recording).

Quick Reference table also split into Required/Optional subsections.

Addresses review feedback on PR security-alliance#375.

* docs(zoom-hardening): remove join-before-host + tighten language

* fix: rename endpoint_security to endpoint-security (no underscores in paths)

* fix: remove unrelated index file changes from PR

* chore: remove redundant quick reference section per review

* fix: revert auto-generated guides/index.mdx to develop state

Reverts manual modification to auto-generated file per reviewer feedback.
The endpoint-security entry will be added by the index generator.

* fix: use account-management (dashes) in guides/index.mdx to match upstream

The auto-generated index.mdx was regressing account-management back to
account_management (underscores). Upstream already standardized on dashes.

---------

Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
…delines (security-alliance#376)

* content(add): white hat frontrunning section in SEAL 911 war room guidelines (closes security-alliance#228)

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>

* fix(whitehat-frontrunning): attribute to SEAL, verify claims against upstream README

- Change contributors from dickson to SEAL to match other playbooks
- Verify all white hat frontrunning claims against pcaversaccio/white-hat-frontrunning README
- Remove hallucinated claim about automatic bundle retry monitoring
- Remove unverified tweet reference for batch ownership transfer
- Remove fabricated EIP-7702 step about victim signing delegation authorization
- Add actual transaction links from README for Degen and Zyfai rescues
- Add direct link to community-examples directory
- Condense section from ~50 lines to ~25 lines while preserving all accurate information

---------

Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
…ty-alliance#332) (security-alliance#377)

- New page: docs/pages/wallet-security/smart-contract-interaction-security.mdx
- Add QuillAudits contributor to contributors.json
- Add sidebar entry with dev: true

Rebased cleanly on develop — no unrelated contributor changes.
…ity-alliance#378)

* feat(certs): add Export All Certifications button to overview page

Adds a single button on the certs overview page that generates one XLSX
file containing all 6 SEAL certifications, each on its own worksheet.

- New component: ExportAllCerts (fetches cert-data.json, generates XLSX)
- New build script: generate-cert-data.js (extracts MDX frontmatter to JSON)
- Build pipeline updated to generate cert-data.json before vocs build
- Includes any user responses stored in localStorage from individual certs
- Reuses existing ExcelJS formatting (SEAL purple headers, dropdown validation,
  frozen headers, auto-filters)

Closes #TBD

* fix: remove generate-cert-data from dev script, keep build-time only

* Delete docs/public/cert-data.json

* Update .gitignore to exclude cert-data.json

Add .direnv to .gitignore and avoid certs data.

---------

Co-authored-by: Matías Aereal Aeón <388605+mattaereal@users.noreply.github.com>
…urity-alliance#398) -- verified (security-alliance#411)

* Move sandboxing/isolation guidance from AI Security to DevSecOps (issue security-alliance#398)

(cherry picked from commit 6f4e19c)

* Rename sandboxing pages and remove AI-specific wording (issue security-alliance#398)

(cherry picked from commit 6526afb)

* Remove moved stub pages after DevSecOps consolidation (issue security-alliance#398)

(cherry picked from commit 0c0fe91)

* Expand DevSecOps sandboxing/isolation guidance with concrete controls and references (issue security-alliance#398)

(cherry picked from commit f56ae55)

* docs(devsecops): add links to key DevSecOps pages

(cherry picked from commit 0be5d0c)

* Reorganize DevSecOps isolation/sandboxing navigation

(cherry picked from commit 6a4aecf)

* docs(devsecops): group isolation guides under dedicated section

* docs(devsecops): add key takeaway callouts to overview and isolation pages

* docs(ai-security): add brief DevSecOps isolation reference and remove canonical wording

* Delete docs/pages/config/index.mdx

* docs(devsecops): remove legacy isolation moved-page stubs

* docs(devsecops): tighten key takeaway bullet callouts

* docs(devsecops): convert key takeaways to paragraph style

* fix(devsecops): remove broken reference links

---------

Co-authored-by: Matías Aereal Aeón <388605+mattaereal@users.noreply.github.com>
…indexes + minor change to the index generator and sync tags (security-alliance#413)
* Integrate incident response template into incident management

* Remove attribution from imported incident response template pages

* Fix incident response template MDX build issues

* Reduce duplicated incident response content

* Polish imported incident response formatting

* Remove Obsidian wording from IR overview

* Clean up remaining template placeholder text

* Polish imported incident response metadata

* Restructure incident response examples under templates

* Move runbook template and remove incident attribution

* Credit Nick on incident response template pages

* Update contributors.json

* Assign Isaac to incident response runbooks

* Update docs/pages/incident-management/incident-response-template/runbooks/build-pipeline-compromise.mdx

Co-authored-by: Sara Russo <sararusso984@gmail.com>

* Remove unnecessary footer separators

* Restore incident management attribution blocks

* Update docs/pages/incident-management/incident-response-template/roles-and-staffing.mdx

Co-authored-by: Sara Russo <sararusso984@gmail.com>

* Update docs/pages/incident-management/incident-response-template/roles-and-staffing.mdx

Co-authored-by: Sara Russo <sararusso984@gmail.com>

* Update docs/pages/incident-management/incident-response-template/roles-and-staffing.mdx

Co-authored-by: Sara Russo <sararusso984@gmail.com>

* Update docs/pages/incident-management/incident-response-template/roles-and-staffing.mdx

Co-authored-by: Sara Russo <sararusso984@gmail.com>

* Update docs/pages/incident-management/incident-response-template/runbooks/build-pipeline-compromise.mdx

Co-authored-by: Sara Russo <sararusso984@gmail.com>

* Update docs/pages/incident-management/incident-response-template/runbooks/cdn-hosting-compromise.mdx

Co-authored-by: Sara Russo <sararusso984@gmail.com>

* Update docs/pages/incident-management/incident-response-template/runbooks/ddos-attack.mdx

Co-authored-by: Sara Russo <sararusso984@gmail.com>

* Remove in-content separators from incident response template

---------

Co-authored-by: Sara Russo <sararusso984@gmail.com>
@github-actions
Copy link

Sidebar Configuration Reminder

This PR includes added, renamed, or removed documentation files:

  • docs/pages/ai-security/ai-execution-sandboxing-practical-guide.mdx (removed)
  • docs/pages/ai-security/ai-execution-sandboxing.mdx (removed)
  • docs/pages/ai-security/capability-based-isolation-for-ai-agents.mdx (removed)
  • docs/pages/ai-security/devsecops-isolation-sandboxing-reference.mdx (added)
  • docs/pages/ai-security/network-and-resource-isolation-in-ai-sandboxes.mdx (removed)
  • docs/pages/ai-security/sandboxing-as-a-complement-to-execution-path-enforcement.mdx (removed)
  • docs/pages/ai-security/sandboxing-for-tool-and-execution-calls.mdx (removed)
  • docs/pages/devsecops/isolation/capability-based-isolation.mdx (added)
  • docs/pages/devsecops/isolation/execution-sandboxing-practical-guide.mdx (added)
  • docs/pages/devsecops/isolation/execution-sandboxing.mdx (added)
  • docs/pages/devsecops/isolation/index.mdx (added)
  • docs/pages/devsecops/isolation/network-and-resource-isolation.mdx (added)
  • docs/pages/devsecops/isolation/sandboxing-and-isolation.mdx (added)
  • docs/pages/devsecops/isolation/sandboxing-and-policy-enforcement.mdx (added)
  • docs/pages/devsecops/isolation/sandboxing-for-tool-execution.mdx (added)
  • docs/pages/guides/endpoint-security/index.mdx (renamed)
  • docs/pages/guides/endpoint-security/zoom-hardening.mdx (added)
  • docs/pages/incident-management/incident-response-template/communications.mdx (added)
  • docs/pages/incident-management/incident-response-template/contacts.mdx (added)
  • docs/pages/incident-management/incident-response-template/incident-response-policy.mdx (added)
  • docs/pages/incident-management/incident-response-template/overview.mdx (added)
  • docs/pages/incident-management/incident-response-template/roles-and-staffing.mdx (added)
  • docs/pages/incident-management/incident-response-template/runbooks/build-pipeline-compromise.mdx (added)
  • docs/pages/incident-management/incident-response-template/runbooks/cdn-hosting-compromise.mdx (added)
  • docs/pages/incident-management/incident-response-template/runbooks/ddos-attack.mdx (added)
  • docs/pages/incident-management/incident-response-template/runbooks/dependency-attack.mdx (added)
  • docs/pages/incident-management/incident-response-template/runbooks/dns-hijack.mdx (added)
  • docs/pages/incident-management/incident-response-template/runbooks/frontend-compromise.mdx (added)
  • docs/pages/incident-management/incident-response-template/runbooks/key-compromise.mdx (added)
  • docs/pages/incident-management/incident-response-template/runbooks/overview.mdx (added)
  • docs/pages/incident-management/incident-response-template/runbooks/smart-contract-exploit.mdx (added)
  • docs/pages/incident-management/incident-response-template/runbooks/third-party-outage.mdx (added)
  • docs/pages/incident-management/incident-response-template/templates/example-incident-log.mdx (added)
  • docs/pages/incident-management/incident-response-template/templates/example-post-mortem.mdx (added)
  • docs/pages/incident-management/incident-response-template/templates/incident-log-template.mdx (added)
  • docs/pages/incident-management/incident-response-template/templates/overview.mdx (added)
  • docs/pages/incident-management/incident-response-template/templates/post-mortem-template.mdx (added)
  • docs/pages/incident-management/incident-response-template/templates/runbook-template.mdx (added)
  • docs/pages/opsec/control-domains/organizational/index.mdx (removed)
  • docs/pages/opsec/control-domains/people/index.mdx (removed)
  • docs/pages/opsec/control-domains/physical-environmental/index.mdx (removed)
  • docs/pages/opsec/control-domains/technical/index.mdx (removed)
  • docs/pages/opsec/improvement/index.mdx (removed)
  • docs/pages/opsec/old/cloud-third-party/index.mdx (removed)
  • docs/pages/opsec/old/data-protection/index.mdx (removed)
  • docs/pages/opsec/old/device-endpoint-security/index.mdx (removed)
  • docs/pages/opsec/old/digital-identity-access/index.mdx (removed)
  • docs/pages/opsec/old/governance/index.mdx (removed)
  • docs/pages/opsec/old/human-centered-security/index.mdx (removed)
  • docs/pages/opsec/old/incident-response/index.mdx (removed)
  • docs/pages/opsec/old/index.mdx (removed)
  • docs/pages/opsec/old/lifecycle/index.mdx (removed)
  • docs/pages/opsec/old/monitoring/index.mdx (removed)
  • docs/pages/opsec/old/network-communication/index.mdx (removed)
  • docs/pages/opsec/old/physical-security/index.mdx (removed)
  • docs/pages/opsec/old/risk-management/index.mdx (removed)
  • docs/pages/opsec/principles/index.mdx (removed)
  • docs/pages/user-team-security/index.mdx (removed)
  • docs/pages/wallet-security/smart-contract-interaction-security.mdx (added)

Please ensure that:

  • The sidebar in vocs.config.tsx has been updated to include these files
  • New content has the dev: true parameter so it's marked as under development
  • Sidebar links match the file paths - use the preview deployment to verify

See Contributing Guide – Sidebar & Navigation for more details.


This is an automated reminder. If this PR doesn't need sidebar changes, you can ignore this message.

@frameworks-volunteer frameworks-volunteer force-pushed the matta/ir-template-tightening branch 2 times, most recently from 3940a32 to f7a767c Compare March 21, 2026 18:45
@frameworks-volunteer frameworks-volunteer force-pushed the matta/ir-template-tightening branch from f7a767c to e5d6c60 Compare March 21, 2026 18:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants