Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Incident Response

This chapter describes Vouch’s incident severity classification, response procedures, and communication channels for security events.

Severity Levels

LevelDescriptionResponse Time
CriticalActive exploitation, credential theft1 hour
HighExploitable vulnerability, no active exploitation24 hours
MediumVulnerability requiring unlikely conditions7 days
LowMinor issues, defense in depth30 days

Response Procedure

  1. Triage — Assess severity and scope
  2. Contain — Revoke affected credentials, disable vulnerable features
  3. Investigate — Root cause analysis
  4. Remediate — Deploy fix
  5. Communicate — Notify affected users
  6. Review — Post-incident analysis

Communication Channels

  • Security advisories: https://vouch.sh/security
  • CVE assignments: Via GitHub Security Advisories
  • Status page: https://status.vouch.sh