Gitlab hero border pattern left svg Gitlab hero border pattern right svg

Application Security Engineer Handling P1/S1 Issues

Appsec Engineer Procedure for Handling S1/P1 Issues

The following process is a supplement to the first few steps of the the critical release process

Once a potential S1/P1 issue is made known. The appsec engineer steps are as follows:


  1. Triage and verify the issue as you normally would triage a report.
  2. To help SecOps quickly determine impact and log analysis, comment in the security issue with the summarized reproduction steps (HTTP Requests, generated log messages, images, etc).


  1. Engage the security oncall with a link to the issue.
  2. Engage the appropriate engineering manager and product manager of the affected component in both the issue and in the appropriate Slack channels.


Sometimes the fix is very simple, sometimes it's not. If the impact to users is greater than the time it takes to apply the long-term fix, you will need to consider a short term solution as well as the long term one. Otherwise, if you and the development team are confident the fix is straightforward and simple, then you only need to do the long term fix and roll it out in a critical security release.

Short term

  1. Collaborate with the development, security, and SRE/infrastructure teams to brainstorm short term solutions until a long term patch can be released.
  2. Analyze the impact for each option.
    • How effective is it at solving the problem?
    • How many customers are affected by this decision?
    • How exactly are they affected?
    • What's the magnitude?
    • What other positive and negative consequences are there?
  3. Choose the solution that best balances the concerns above with the concerns of participating teams.
  4. Approval is not required, but clear communication of decision is necessary. Notify the Director of Security, Directory of Infrastructure, and any other parties involved with the proposals and decision.
  5. Once the short term solution has been delivered, validate that the fix was effective.

Some past short term options have been:

Long term

  1. Handle it like you normally would for a critical security release.



Appsec engineers are not on-call. That means when the assigned appsec engineer end of day arrives, they are responsible for handing it off to a next appsec engineer in a subsequent timezone. If no appsec engineer is available, handoff to the secops engineer on-call.