The Security Incident Response Team (SIRT) is collectively on-call 24/7/365, with a team member being designated as the Security Engineer On-Call (SEOC) on a weekly basis.
On-call scheduling is organized in Pager Duty as the
Security Responder policy.
During those on-call shifts the Security Engineer On-Call has three core responsibilities:
The on-call Engineer's primary concern is to provide timely engagement to pages sent to SIRT. When receiving a page:
#security-departmentSlack channel or through PagerDuty directly
If the alarm is not acknowledged within 15 minutes the Security Incident Manager On-Call will be alerted.
Occasionally issues in Security Engineering and SIRT issue tracker will be marked with the
oncall label, and during the on-call shift we should watch for and engage on new, as well as existing, open/active issues to assist towards mitigation/resolution.
These issues are typically generated through automated alerting and may occasionally require human intervention based on the scenario. In the least these should be reviewed twice per shift.
As we continue to grow and mature in the operational security space we will have many new experiences, succeed and fail at handling security events, and subsequently learn from them. These learnings should be documented through runbooks, processes, and handbook updates. During on-call shifts it's the on-call Engineer's responsibility to take notes, look for improvement opportunities in how we handle scenarios, find steps that can be automated, and ask questions about our tools, services, infrastructure, and try to find questionable security areas or risky decisions so we can improve GitLab's overall security posture.
As on-call periods are typically interrupt driven it can be difficult to work on large projects, this is a good opportunity to engage with the queue of
Backlog issues. It is the responsibility of the on-call Engineer to review the SIRT backlog board for items that can be accomplished during the on-call period. When working an issue from the Backlog the on-call Engineer will then own the issue and must see it through to completion. This may include completing it in the week following their on-call schedule.
There's a simple rule to incident ownership: Whoever ACK's the page owns it. Other Engineers and members of SIRT may engage to maintain 24/7 coverage but ownership remains with whomever ACK'd the page.
Ownership of an incident implies being accountable to:
Being accountable does not imply being the sole person to act on these tasks. Hand-off at the end of an on-call shift, or coordinated breaks during extended incidents, would temporarily place another person responsible for these tasks. To coordinate these hand-offs it's essential to equip the next person with all necessary details.
To best prepare the next Engineer and ensure continued progress, details should be recorded in the page-created issue as well as the SIRT slack channel. Details like:
In addition to the SIRT Engineers being on-call 24/7/365, the Security Managers in the GitLab Security Department act as a backup in the event the Security Engineer On-Call is unable to respond to a page. PagerDuty will automatically engage the Security Manager on-call if the SIRT engineer doesn't acknowledge a page within
It's the responsibility of the Security Manager on-call to: