In case of a security incident it’s best to have a clearly defined plan and responsibilities. Below you will find more details regarding the response plan that Veemo has in place in the unlikely case of a security breach.
Responsibilities
Level 1: Depending on how the incident is reported/discovered we generally have the first level of technical support that is likely to triage/escalate the issue. Normally that role is reserved for whoever is on the level 1 tech support shift at the time.
Level 2: Is a senior engineer or CTO that classifies the impact of the security incident.
Level 3: Is a senior engineer or CTO that classifies the impact of the security incident.
Triage Process
Before escalating the incident to the next level, the person that first finds out about it needs to verify the incident and its initial impact.
Escalation Process
Once verified the escalation process should be immediate to level 2 and then level 3 verbally, by phone, email, whatever medium is available.
Classification Process
Once escalated the rank/severity of the incident must be determined. Does it affect all customers? A single company? An individual? What type of data was affected if any? Was it encrypted? If so, how?
Investigation Process
Analyze all elements of the incident in order to identify all the causes or where a failure occurred including the software, hardware, people, and internal processes.
Lessons Learned
Based on the result of the investigation, determine what could be done to prevent this attack and what defensive mechanisms failed and take immediate action to remediate the cause and improve the future process. This information should also be public and posted on our public blog.