Add Incident Response Plan (IRP)#21
Conversation
Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
There was a problem hiding this comment.
Code Review
This pull request introduces a new Incident Response Plan (IRP) document detailing the five phases of security vulnerability management. The review feedback suggests shortening the containment timeline for critical vulnerabilities, using a dedicated security email address for reports, and addressing a broken link to a missing SECURITY.md file.
|
|
||
| ## Phase 2 — Containment | ||
| _"We've identified the issue and are limiting its impact."_ | ||
| **Target: 1–7 days after triage** |
There was a problem hiding this comment.
For vulnerabilities classified as Critical (e.g., active exploitation), the containment target of 1–7 days is likely too long. It is recommended to aim for immediate containment (e.g., within 24 hours) for such high-stakes incidents to minimize impact.
| **Target: 1–7 days after triage** | |
| **Target: 1–7 days after triage (Immediate for Critical)** |
|
|
||
| ## Contact | ||
|
|
||
| Email: [hello@instavm.io](mailto:hello@instavm.io) |
There was a problem hiding this comment.
Using a dedicated security email address (e.g., security@instavm.io) is a best practice for handling vulnerability reports. This ensures that sensitive security communications are routed to the correct team and handled with appropriate confidentiality.
| Email: [hello@instavm.io](mailto:hello@instavm.io) | |
| Email: [security@instavm.io](mailto:security@instavm.io) |
|
|
||
| ## Reporting a Vulnerability | ||
|
|
||
| See [SECURITY.md](SECURITY.md). **Do not open public issues.** |
Adds a concise Incident Response Plan covering: