Triage Rotation

Application Security team members are alphabetically assigned as the responsible individual (DRI) for incoming requests to the Application Security team, typically for a weekly or fortnighly period.

Who is on rotation?

Automation manages the scheduling and assignment of rotations:

What are the rotations?

The following rotations are defined:

  • (Weekly Assignment) HackerOne + Security Dashboard Review
    • Point of contact for “New” HackerOne reports during that week.
    • Responsible to escalating to other team members and management if the size of the either queue spikes.
    • Responsible for reviewing security dashboards on a best-effort level
  • (Weekly Assignment) Triage Rotation (mentions and issues), by order of priority:
    • Daily triage of FedRAMP vulnerabilities reported by our scanners
      • This is a mandatory daily check to make sure we do triage of vulnerabilities.
      • If it is not possible to do a daily check and triage of reported vulnerabilities, ask on for help in the #sec-appsec channel.
    • First responder to JiHu Contribution pings that come into the #sec-appsec Slack channel
    • First responder to automated messages posted in the #public_merge_requests_referencing_confidential_issues Slack channel
      • Add a check mark emoji if the merge request can be public
      • If the merge request references a legitimate security issue
        • If the issue has a ~security-fix-in-public label, indicating it has been approved by an AppSec team member to be fixed in public, link to the comment granting approval or include a message in Slack denoting that the ~security-fix-in-public label was added.
        • Decide if it can be public anyway, and apply the ~security-fix-in-public label retrospectively
        • Otherwise contact SIRT and the merge request author to get the merge request removed.
        • Use the Urgent - SEOC should be paged right away option if waiting up to 24 hours for a resolution would be too long.
    • First responder to mentions of the following group aliases:
      • @gitlab-com/gl-security/product-security/appsec on GitLab.com
      • @appsec-team in Slack
    • First responder for issues created needing triage: ~security-triage-appsec issue search
      • Refer to [this page]({{ ref “engaging-with-security#reproducibility-on-security-issues” }}) to learn about the different labels that we can apply to issues when they’re not vulnerabilities
  • (~Fortnightly Assignment) Security Engineer for Security & Patch Releases
  • (Fortnightly Assignment, Federal AppSec only) Release Certifications
    • Responsible for the release certification process
    • This applies to any release that might have JiHu contributions, including monthly and patch releases
  • (Quarterly Assignment) Bug Bounty/AppSec Blog Post

If the Application Security team member has a conflict for the assigned week they may swap rotation weeks with another team member. This may be done for any reason including time off or the need for time to focus on a particular task.

Team members should not be assigned on weeks they are responsible for the scheduled security release.

Team members not assigned as the DRI for the week should continue to triage reports when possible, especially to close duplicates or handle related reports to those they have already triaged.

Team members remain responsible for their own assigned reports.

Triaging exposed secrets

Exposure of information and secrets is handled a little differently to vulnerabilities, as there is nothing to patch and therefore no need for a GitLab Project Issue, CVSS, or CVE. When you’re pinged during your rotation and you see a leaked secret, follow the process discribed on the HackerOne runbook

Last modified October 29, 2024: Fix broken links (455376ee)