Incident Response — Security Checklist
Detection, response procedures, communication, containment, recovery, and post-incident review.
1. Team Structure, Roles & Responsibilities
-
Documented Incident Response PolicyDo you maintain a documented incident response (IR) policy that defines scope, objectives, and roles?
-
Incident Commander and IR RolesDo you have a designated incident commander and incident response team with clearly defined roles, responsibilities, and decision-making authority? Is the incident commander role clearly established to coordinate response activities, make time-sensitive decisions, and ensure clear accountability during incidents?
-
Subject Matter Experts for Protocol InternalsDo you have designated subject matter experts (ex. Core Devs) who understand different parts of protocol internals and can analyze ongoing attacks and prepare response strategies for potential attack vectors?
-
Designated Signer Roles for Emergency ActionsDo you have designated signer roles with documented authority and procedures for executing emergency transactions (pausing, freezing, parameter changes)?
-
Periodic Review of IR RolesDo you periodically review and update IR team roles, authorities, and escalation measures to reflect protocol changes, new teams, or evolving governance structures?
Notes:
1. (cont.)
-
Communications Personnel for Public InfoDo you have designated Communications personnel responsible for public information sharing and incident response record-keeping?
-
Legal Support for Incident ResponseDo you maintain Legal support with documented procedures for analyzing legal and regulatory implications of response actions, approving whitehat engagement agreements, and reviewing public communications?
-
Procedures for Cross-Team Incident CoordinationDo you have documented procedures for coordinating between technical teams (Core Devs/Auditors) and operational teams (Security Council/Communications) during incidents?
-
External Protocol Stakeholder Contact MethodsDo you maintain contact methods & communication channels for external companies that run protocols you depend on, or that depend on your protocol?
2. Monitoring & Detection
-
24/7 Monitoring and After-Hours ProceduresDo you maintain documented monitoring coverage for critical systems, protocols, and infrastructure components with 24/7 capabilities and procedures for after-hours alert handling?
-
Automated Alerting with PlaybooksDo you have automated alerting configured with embedded playbooks for security events, detecting false alarms, and operational issues?
-
Regular Alert Testing and DrillsDo you conduct regular alert testing and drills to ensure monitoring systems function correctly under various scenarios?
-
Procedures for Alert Triage and EscalationDo you have documented procedures for alert triage, classification, and escalation to appropriate response teams?
Notes:
2. (cont.)
-
Log Retention Policies for ForensicsDo you maintain log retention policies with adequate preservation periods for security and infrastructure logs (including cloud provider logs) to support incident investigation and forensic analysis?
-
Leaked Credential MonitoringDo you maintain procedures for monitoring leaked credentials and compromised accounts associated with the organization?
-
Social Media Compromise MonitoringDo you have procedures for monitoring organizational social media accounts & websites for indicators of compromise or unauthorized activity?
-
Immutable Logging and Tamper-Evident AlertingDo you maintain requirements for immutable logging and tamper-evident alerting channels that trigger alerts if logs are altered or monitoring is disabled?
3. Pager Systems & Escalation
-
Redundant Paging Systems with TestingDo you operate redundant paging systems with documented procedures and regular testing?
-
Maintain On-Call Coverage SchedulesDo you maintain current on-call schedules with documented coverage requirements and backup procedures?
-
Documented Time-Based Escalation ProceduresDo you have documented escalation procedures with time-based triggers and management notification requirements?
-
Define and Track Response Time TargetsDo you define and track response time targets for different incident severity levels?
Notes:
4. Response Procedures & Coordination
-
Documented Incident Response PlaybooksDo you maintain documented response playbooks for common incident types (protocol exploits, infrastructure failures, access control breaches, data security incidents, and supply chain compromises)?
-
Step-by-Step Initial Response ProceduresDo you have step-by-step procedures for initial response actions including containment, evidence preservation, and stakeholder notification?
-
Role-Based Incident Playbooks by RoleDo you maintain role-based playbooks that define specific responsibilities for different team members (Core Devs, Auditors, Signers, Communications, Legal) during incidents?
-
Procedures for Coordinating Multisig OperationsDo you maintain procedures for coordinating multisig operations during incidents including signer availability and cross-timezone challenges?
Notes:
4. (cont.)
-
Documented Criteria for Major Response DecisionsDo you have documented criteria for major response decisions (system shutdown, public disclosure, external assistance) and escalation policies for when to engage leadership?
-
External Expertise Engagement ContactsDo you maintain contact information and procedures for engaging external expertise (forensics, legal, specialized consultants)?
-
Emergency Cards with Key Response StepsDo you maintain emergency cards or quick-reference materials containing key personnel and response steps for each protocol component?
5. Signer Operations & Emergency Transactions
-
Multiple Channels for Global Signer ReachDo you maintain multiple communication channels (primary and backup) with documented procedures for reaching signers across time zones, including during emergencies?
-
Pre-Signed Emergency Transactions for ProtocolDo you maintain pre-signed emergency transactions for critical protocol functions (pause, freeze, parameter changes)?
-
Procedures for Rapid Emergency TransactionsDo you have documented procedures for rapidly executing emergency transactions with minimal coordination time?
-
Multiple Signing Methods and BackupsDo you maintain multiple signing methods and backup procedures for signers transaction execution?
-
Rotating Keys and Replacing SignersDo you have a documented procedure for rotating keys and replacing compromised signers?
Notes:
6. Communication & Coordination
-
Dedicated Incident Communication ChannelsDo you maintain dedicated communication channels for incident response with documented access controls, member lists, and procedures for rapidly creating new incident-specific channels when needed?
-
Incident Status Reporting ProceduresDo you have documented procedures for incident status reporting including frequency, format, and distribution lists?
-
Secure Incident Information CommunicationsDo you maintain secure communication procedures for sensitive incident information?
-
Coordinating Communications with Protocol UsersDo you maintain documented procedures for coordinating communications with protocol users during and post-exploit?
-
Approved Templates and Escalation ProceduresDo you have pre-approved communication templates and escalation procedures for different incident types and severity levels?
-
Public Information Flow and Misinformation PreventionDo you maintain procedures for managing public information flow and preventing misinformation during active incidents?
Notes:
7. Drills & Testing
-
Regular Incident Response Drills and EvaluationDo you conduct regular incident response drills that test pager systems, escalation procedures, team coordination, monitoring systems, containment procedures, and recovery processes? Do you evaluate drill performance, identify gaps, and track improvement actions based on both exercise findings and real incident experience?
Notes: