-
Notifications
You must be signed in to change notification settings - Fork 57
Security Event Review Checklist
Security events will be reviewed every Wednesday. Logs are available via https://logs.fr.cloud.gov. Make github issues for each undiscovered problems. For any incidents that happen regarding accounts, notify the Acting FEC CISO, Justin Park, and follow the 18F incident response handbook.
The development team will have a rotation of log duty. Scheduling people for their rotation will be managed by the system owner. This is added in the FEC team calendar, with the assignee added as the guest for that day.
Checklist:
- Create a github issue to track this Security Event Review.
- Review Snyk for all repositories and open a ticket for all alerts.
- Review production logs for account creations, ensure these were approved in a ticket, and verify that the number of service keys in cloud.gov is unchanged.
- Review production logs for account permission elevations, ensure these were approved in a ticket
- Review actionable security events on production logs for successful and unsuccessful account logon events, account management events, object access, policy change, privilege functions, process tracking, system events, all administrator activity, authentication checks, authorization checks, data deletions, data access, data changes, and permission changes.
- Deactivate any accounts for people who have left the team.
- Note any findings in the Security Event Review issue.
- Close the Security Event Review issue.
See all Security Event Review issues here
SNYK DASHBOARD: https://snyk.io/org/fecgov/projects
- FEC-CMS: package.json and requirements.txt
- OPENFEC package.json, requirements.txt, and flyway
- FEC-EREGS package.json and requirements.txt
- FEC-PATTERN-LIBRARY package.json
If you haven't done so yet, you can also sign up for a free open-source account with Snyk and make a specialized dashboard and get security alerts mailed to you.
Compare account creation to account approvals
Look for account creations and other security events In Kabana do searches like:
cms accounts created and changed the previous week
cms accounts created and changed this week
Check or via dashboard scroll to the users section. Users need to be out of all spaces before you can use the dashboard tool to remove them as org users.
Note that deployer accounts have long, random strings for their names.
When you are offboarding someone who has left the team, first let them know. Be sure to thank them for their contributions and offer to reactivate access if they need it in the future. Create an issue in the fec-accounts repo to track their offboarding. On the ticket, use the checklist below to track if they have the following accounts, and remove them:
- GitHub groups
- Wagtail
- cloud.gov
- RDS log in
- Amazon
- New Relic
- api.data.gov admin
- Move user to fecgov Slack #Alumni channel