Security support rotation
The Security team has a dedicated member on a weekly support rotation. This document outlines the responsibilities of this role and how to execute the tasks. In a nutshell, these are the responsibilities of the engineer:
- Incoming inquiries from other teams
- PR reviews
- Bug bounty reports on HackerOne
- Security questionnaires
- Cloudflare WAF blocks
- Vulnerability board
- Emails to security@sourcegraph.com
- Ensuring a smooth transition to the next engineer on rotation
Expectations
The engineer on rotation is expected to comply with these responsibilities only within their usual working hours. There is no on-call, 24x7-watch expectation on these tasks. The async nature of Sourcegraph allows us to properly support the organization without having to be in front of the computer all day.
You are not expected to provide all answers to inquiries or review all PRs. You are expected to be the initial responder and decide whether to tackle the work right away or add it for later planning. As a general rule of thumb, any work that will take longer than half a day should become a ticket in the team’s Jira backlog. This also includes work that takes less than half a day but needs to be transitioned to another engineer.
The engineer on support rotation is responsible for anything that doesn’t have a clear owner in our team. For example if we start receiving a trove of PRs for something that another engineer is currently working on, there’s no need to keep an eye on those. On the other hand, if it’s a one-off review then it’s your responsibility to ensure the ball doesn’t get dropped.
Finally, it’s your responsibility to ensure a smooth transition to the next engineer on rotation. This includes:
- Wrapping up tasks as you can;
- Ensuring all tasks are properly documented (with Jira tickets and status updates);
- Communicating any leftover tasks/asks/things to keep in mind for whoever is up next. This is best done the day before the rotation transitions via an async recap update posted in #security-internal.
Channels to keep an eye on
The following channels/boards should be checked at least once a day:
- #security
- #security-internal
- #security-monitoring
- Messages that tag @security-team or @security-support
- GitHub notifications tagging @security
- HackerOne reports
- security@sourcegraph.com email
- Jira vulnerability board
How-tos
Incoming questions and ad-hoc inquiries from other teams
We get asked various questions on a variety of topics. It’s not expected that you know all the answers but it is your responsibility to go after the answers and engage the correct people in a timely manner. These questions serve as a great opportunity to improve documentation so keep that in mind if you believe the answer at hand may be reused in the future.
PR reviews
Our team gets tagged for reviewing PRs in the @security team in GitHub. PR reviews can concern any code written by our devs, from JS through Kubernetes and everything in between. If you do not feel comfortable reviewing a PR set due date expectations with the team requesting the review and request help from other team members. PR reviews are a great opportunity for pairing and cross-team collaboration.
Bug Bounty reports
We receive reports into our HackerOne program. Make sure that:
- You have an account on HackerOne
- You have notifications set up to receive emails reports from the platform
You should be able to view the HackerOne inbox for Sourcegraph here.
When HackerOne receives new bounty reports, they will do the first stage of trigge themselves, and come to a conclusion about the report. They will then move the report to the ‘Pending review’ stage, which is where you will be expected to confirm that their work was correct.
If you feel unsure about their conclusion on a vulnerability, get help as soon as possible, since there are SLAs involved.
We may continue to receive bounty reports to security@sourcegraph.com, the email address for our old public bounty program. Keep an eye on these. In most cases, we will not consider such reports for a bounty, but in case we receive a particularly good report, we might consider the reporter for an invite to our HackerOne program. Discuss any reports which you feel might qualify for an invite with the team before responding to the reporter – we should be using our invites sparingly and only for the best reports.
To assign a bounty to a reporter:
- Go to the HackerOne inbox linked above
- Find the relevant report using the search bar on the left-hand side of the page
- Scroll to the bottom of the report
- Click on the dropdown that says ‘Add comment’ and select ‘Set award’
- In the field that pops up to the right, enter the agreed dollar amount
- Add a message thanking the reporter for their effort, and click ‘Set award’ on the bottom right of the page
Still unsure? Watch this video.
Security questionnaires
We support Sales in filling out security questionnaires for customers. Sales does a first pass and we review it. These requests come in through the #security channel Security Questions workflow. The CE will list customer name, deployment type, link to the questionnaire and any other information. Reviewing these questionnaires requires extensive knowledge of our company and application. It’s inevitable that the first few will be somewhat bumpy but since these questionnaires often repeat questions it doesn’t take long to be self-sufficient here. This spreadsheet is maintained by the CE team with a knowledge base of common questions. If you run into any incorrect or missing information make sure to update the spreadsheet. This folder contains previous security questionnaires that can be useful for reference. Keep in mind that many of these are old and may contain outdated information.
Cloudflare WAF blocks
[NOTE: this will eventually be moved to more thorough docs on operating Cloudflare]
Sourcegraph.com is behind the Cloudflare WAF. It’s a great tool but sometimes it blocks legitimate uses of our application, especially searches. When that happens the user is presented with the default Cloudflare block page. To review Cloudflare blocks:
- Get information from the user about an approximate timestamp and which HTTP request they were making, especially the URL.
- Go on Cloudflare -> Firewall -> Overview and use filters to find the event where the user was blocked.
- Once you find the event take a note of the RuleID:
- Go to Firewall -> Managed rules and find the rule group containing this RuleID. Find information about the rule and what it’s trying to block. In most cases we disable the rule regardless since a WAF cannot block legitimate searches.
- To disable the rule, add the RuleID to this list and follow our git flow for updating infrastructure.
Security Vendor Reviews
Vendor reviews are requested by Legal or Compliance when a new vendor is being requested by a teammate. When requested, we want to review various aspects of the vendor’s security policy, not limited to but including, data processing, data protection, security reporting, and type of data being shared. Here is a non-exhaustive list of items you may want to review for this request.
Information needed and reviewed:
- What type of information is being shared with the vendor: customer data, sourcegraph data, both?
- Security compliance certifications like ISO27001 or SOC 2.
- Encryption standards of data at rest and in transit (transport layer security).
- Clear measures around confidentiality, integrity, availability, and resilience of processing systems and services.
- Clear process in case of a security incident and the reporting to Sourcegraph.
- Ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident.
- Periodic testing on security, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing.