Application Security Engineer Handling priority::1/severity::1 Issues
The following process is a supplement to the first few steps of the critical release process
Once a potential severity::1/priority::1 issue is made known. The appsec engineer steps are as follows:
Triage
- Triage and verify the issue as you normally would triage a report.
- Finalize the CVSS score of the security issue with team member votes on Bug Bounty Council (BBC) thread before engaging the SIRT team. Consider using a sync call or Slack for the discussion due to time sensitivity. Capture the outcome of the discussion in the BBC thread. If a sync call or a Slack discussion was not possible due to AppSec team members in the region being on PTO or timezone issues, trigger the SIRT workflow if 4 hours have passed since the issue was triaged.
- Within the BBC thread, create a GitLab Dedicated specific CVSS score.
- To help SecOps quickly determine impact and log analysis, comment in the security issue with the summarized reproduction steps (HTTP Requests, generated log messages, images, etc).
- After escalating, do an investigation to try to determine if there are other immediately vulnerable components or other impacts.
Escalate
- Engage the Security Engineer on-call with a link to the issue, a summary of what has happened, and an description of what SIRT may need to do.
- Engage the appropriate engineering manager and product manager of the affected component in both the issue and in the appropriate Slack channels.
- If help from the GitLab Dedicated team is needed, follow the runbook to escalate to their engineer on call.
- Ping
@appsec-leadership
in the#sec-appsec
Slack channel with a link to the issue. This will help team leadership and other engineers get up to speed, in case they need to step in. - Create a link to the Bug Bounty Council CVSS discussion in the SIRT incident GitLab issue.
- Create a bookmark to the CVSS discussion in the incident specific Slack channel.
Evaluate Impact in Different Environments
Due to differences in settings, feature availability, and configuration between GitLab self-managed, GitLab Dedicated, and GitLab SaaS (GitLab.com), the CVSS for a single vulnerability may differ depending on environment.