Skip to content

Commit 3e7ef01

Browse files
authored
chore: document Incident Response Plan (#13195)
1 parent cb72d7d commit 3e7ef01

File tree

1 file changed

+87
-0
lines changed

1 file changed

+87
-0
lines changed

.github/INCIDENT_RESPONSE_PLAN.md

Lines changed: 87 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,87 @@
1+
# Incident Response Plan
2+
3+
## Reporting a Vulnerability
4+
5+
Please see [the latest guidelines](https://github.com/ohmyzsh/ohmyzsh/blob/master/SECURITY.md) for instructions.
6+
7+
## Phases
8+
9+
### Triage
10+
11+
1. Is this a valid security vulnerability?
12+
13+
- [ ] It affects our CI/CD or any of our repositories.
14+
- [ ] For ohmyzsh/ohmyzsh, it affects the latest commit.
15+
- [ ] For others, it affects the latest commit on the default branch.
16+
- [ ] It affects a third-party dependency:
17+
- [ ] Zsh or git
18+
- [ ] For a plugin, the vulnerability is a result of our usage of the dependency.
19+
20+
2. What's the scope of the vulnerability?
21+
22+
- [ ] Our codebase.
23+
- [ ] A direct third-party dependency (Zsh, git, other plugins).
24+
- [ ] An indirect third-party dependency.
25+
- [ ] Out of scope, a third-party dependency that is the responsibility of the user.
26+
- [ ] Out of scope, any other case (edit this plan and add the details).
27+
28+
3. Is the vulnerability actionable?
29+
30+
- [ ] Yes, we can submit a fix.
31+
- [ ] Yes, we can disable a feature.
32+
- [ ] Yes, we can mitigate the risk.
33+
- [ ] Yes, we can remove a vulnerable dependency.
34+
- [ ] Yes, we can apply a workaround.
35+
- [ ] Yes, we can apply a patch to a vulnerable dependency ([example for CVE-2021-45444](https://github.com/ohmyzsh/ohmyzsh/blob/cb72d7dcbf08b435c7f8a6470802b207b2aa02c3/lib/vcs_info.zsh)).
36+
- [ ] No, the vulnerability is not actionable.
37+
38+
4. What's the impact of the vulnerability?
39+
40+
Assess using the *CIA* triad:
41+
42+
- **Confidentiality**: example: report or sharing of secrets.
43+
- **Integrity**: affects the integrity of the system (deletion, corruption or encryption of data, OS file corruption, etc.).
44+
- **Availability**: denial of login, deletion of required files to boot / login, etc.
45+
46+
5. What's the exploitability of the vulnerability?
47+
48+
Consider how easy it is to exploit, and if it affects all users or requires specific configurations.
49+
50+
6. What's the severity of the vulnerability?
51+
52+
You can use the [CVSS v3.1](https://www.first.org/cvss/specification-document) to assess the severity of the vulnerability.
53+
54+
7. When was the vulnerability introduced?
55+
56+
- Find the responsible code path.
57+
- Find the commit or Pull Request that introduced the vulnerability.
58+
59+
8. Who are our security contacts?
60+
61+
Assess upstream or downstream contacts, and their desired channels of security.
62+
63+
> TODO: add a list of contacts.
64+
65+
### Mitigation
66+
67+
- **Primary focus:** removing possibility of exploitation fast.
68+
- **Secondary focus:** addressing the root cause.
69+
70+
> [!IMPORTANT]
71+
> Make sure to test that the mitigation works as expected, and does not introduce new vulnerabilities.
72+
> When deploying a patch, make sure not to disclose the vulnerability in the commit message or PR description.
73+
74+
> TODO: introduce a fast-track update process for security patches.
75+
76+
### Disclosure
77+
78+
Primary goal: inform our users about the vulnerability, and whether they are affected or not affected based on information they should be able to check themselves in a straightforward way.
79+
80+
> TODO: add a vulnerability disclosure template.
81+
82+
### Learn
83+
84+
- Document the vulnerability, steps performed, and lessons learned.
85+
- Document the timeline of events.
86+
- Document and address improvements on the Security Incident Response Plan.
87+
- Depending on the severity of the vulnerability, consider disclosing the root cause or not based on likely impact on users and estimated potential victims still affected.

0 commit comments

Comments
 (0)