incident-response

Incident Response Skill

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "incident-response" with this command: npx skills add hack23/homepage/hack23-homepage-incident-response

Incident Response Skill

Purpose

Establish comprehensive procedures for detecting, analyzing, containing, eradicating, and recovering from security incidents across all Hack23 projects, aligned with NIST SP 800-61r2 and ISO 27035.

Rules

Incident Classification

MUST classify incidents by severity:

Severity Description Response Time Escalation

Critical Active exploitation, data breach, system compromise 1 hour CEO immediate

High Vulnerability with exploit available, unauthorized access attempt 4 hours CEO within 24h

Medium Suspicious activity, policy violation, failed attacks 24 hours Weekly review

Low Minor policy deviations, informational alerts 72 hours Monthly review

Response Phases

Phase 1: Detection & Analysis

  • MUST monitor security alerts from GitHub Advanced Security (CodeQL, Dependabot, Secret Scanning)

  • MUST classify incident severity within 30 minutes of detection

  • MUST preserve evidence before taking containment actions

  • MUST NOT modify or delete log data during investigation

Phase 2: Containment

  • MUST isolate affected systems/accounts immediately for Critical incidents

  • MUST revoke compromised credentials within 1 hour

  • MUST document all containment actions with timestamps

  • MUST NOT allow affected systems to remain accessible during active exploitation

Phase 3: Eradication & Recovery

  • MUST identify root cause before recovery

  • MUST verify all malicious artifacts are removed

  • MUST rotate all potentially compromised secrets

  • MUST validate system integrity before restoring service

Phase 4: Post-Incident

  • MUST conduct lessons-learned review within 5 business days

  • MUST update incident response procedures based on findings

  • MUST document incident in security log with full timeline

Secret Compromise Response

When a secret is detected in source code:

  • Immediately rotate the compromised credential

  • Review git history for exposure duration

  • Check access logs for unauthorized use

  • Update .gitignore and pre-commit hooks

  • Document in incident log

Hack23 ISMS Policy References

  • Incident Response Plan

  • Information Security Policy

  • Business Continuity Plan

Compliance Mapping

  • ISO 27001:2022: A.5.24-A.5.28 (Incident Management)

  • NIST CSF 2.0: RS (Respond), RC (Recover)

  • CIS Controls v8.1: Control 17 (Incident Response Management)

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

secrets-management

No summary provided by upstream source.

Repository SourceNeeds Review
General

ai governance

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

github-agentic-workflows

No summary provided by upstream source.

Repository SourceNeeds Review
General

product-documentation

No summary provided by upstream source.

Repository SourceNeeds Review