incident-response
SKILL.md
Incident Response Skill
Purpose
Establish comprehensive procedures for detecting, analyzing, containing, eradicating, and recovering from security incidents across all Hack23 projects, aligned with NIST SP 800-61r2 and ISO 27035.
Rules
Incident Classification
MUST classify incidents by severity:
| Severity | Description | Response Time | Escalation |
|---|---|---|---|
| Critical | Active exploitation, data breach, system compromise | 1 hour | CEO immediate |
| High | Vulnerability with exploit available, unauthorized access attempt | 4 hours | CEO within 24h |
| Medium | Suspicious activity, policy violation, failed attacks | 24 hours | Weekly review |
| Low | Minor policy deviations, informational alerts | 72 hours | Monthly review |
Response Phases
Phase 1: Detection & Analysis
- MUST monitor security alerts from GitHub Advanced Security (CodeQL, Dependabot, Secret Scanning)
- MUST classify incident severity within 30 minutes of detection
- MUST preserve evidence before taking containment actions
- MUST NOT modify or delete log data during investigation
Phase 2: Containment
- MUST isolate affected systems/accounts immediately for Critical incidents
- MUST revoke compromised credentials within 1 hour
- MUST document all containment actions with timestamps
- MUST NOT allow affected systems to remain accessible during active exploitation
Phase 3: Eradication & Recovery
- MUST identify root cause before recovery
- MUST verify all malicious artifacts are removed
- MUST rotate all potentially compromised secrets
- MUST validate system integrity before restoring service
Phase 4: Post-Incident
- MUST conduct lessons-learned review within 5 business days
- MUST update incident response procedures based on findings
- MUST document incident in security log with full timeline
Secret Compromise Response
When a secret is detected in source code:
- Immediately rotate the compromised credential
- Review git history for exposure duration
- Check access logs for unauthorized use
- Update
.gitignoreand pre-commit hooks - Document in incident log
Hack23 ISMS Policy References
Compliance Mapping
- ISO 27001:2022: A.5.24-A.5.28 (Incident Management)
- NIST CSF 2.0: RS (Respond), RC (Recover)
- CIS Controls v8.1: Control 17 (Incident Response Management)
Weekly Installs
17
Repository
hack23/homepageGitHub Stars
5
First Seen
Mar 1, 2026
Security Audits
Installed on
opencode17
gemini-cli17
github-copilot17
amp17
cline17
codex17