7.1 KiB
7.1 KiB
Incident Response Plan
Version: 1.0 Effective: February 2026 Owner: Johan Jongsma Review: Annually
1. Purpose
Define procedures for detecting, responding to, and recovering from security incidents affecting Dealspace systems or deal data.
2. Scope
All Dealspace systems:
- Production (muskepo.com / 82.24.174.112)
- Deal data (financial documents, transaction details, participant information)
3. Incident Classification
| Severity | Definition | Response Time | Examples |
|---|---|---|---|
| Critical | Active breach, data exfiltration, system compromise | Immediate (< 1 hour) | Unauthorized deal data access, ransomware, credential theft |
| High | Potential breach, service outage, vulnerability exploited | < 4 hours | Failed intrusion attempt, DDoS, authentication bypass |
| Medium | Suspicious activity, policy violation | < 24 hours | Unusual access patterns, failed login spikes |
| Low | Minor issue, no data at risk | < 72 hours | Reconnaissance scans, policy clarification needed |
4. Contact Information
Primary Contact
| Role | Name | Phone | |
|---|---|---|---|
| Incident Commander | Johan Jongsma | security@muskepo.com | Signal: +31 XXX |
External Contacts
| Service | Contact |
|---|---|
| Legal Counsel | To be established |
| Cyber Insurance | To be established |
| Law Enforcement | Local police non-emergency |
Notification Addresses
| Purpose | Address |
|---|---|
| Security incidents | security@muskepo.com |
| Client support | support@muskepo.com |
5. Detection
Automated Detection
- Rate limiting: Flags excessive requests
- Access logging: All data access logged
- Anomaly detection: Unusual access patterns flagged
- Authentication monitoring: Failed login tracking
Manual Detection
- Client reports of unauthorized access
- Unexpected system behavior
- External notification (security researcher, vendor)
Indicators of Compromise
- Unexpected admin access or privilege escalation
- Unusual database queries or data exports
- New or modified files outside deployment
- Outbound connections to unknown hosts
- Authentication anomalies
6. Response Procedures
Phase 1: Identification (0-30 minutes)
- Acknowledge alert - Confirm incident is real, not false positive
- Classify severity - Use classification table above
- Document - Start incident log with timestamp, initial observations
- Assess scope - What systems/deal data potentially affected
Phase 2: Containment (30 min - 2 hours)
Immediate containment:
# Block suspicious IP
sudo ufw deny from <IP>
# If compromise confirmed, consider service isolation
ssh root@82.24.174.112 "systemctl stop dealspace"
# Preserve logs before any changes
ssh root@82.24.174.112 "cp -r /var/log /opt/dealspace/incident-$(date +%Y%m%d)/"
Short-term containment:
- Preserve evidence (copy logs before rotation)
- Identify scope (what deals/data affected)
- Prevent lateral movement
Phase 3: Eradication (2-24 hours)
- Identify root cause - How did attacker get in?
- Remove threat - Malware, backdoors, unauthorized accounts
- Patch vulnerability - Fix the entry point
- Verify clean - Confirm no persistence mechanisms
Phase 4: Recovery (24-72 hours)
- Restore from backup if needed (see Disaster Recovery Plan)
- Verify integrity - Check data hasn't been modified
- Monitor closely - Watch for re-compromise
- Gradual restoration - Bring services back incrementally
Phase 5: Lessons Learned (1-2 weeks post-incident)
- Post-mortem - What happened, timeline, decisions made
- Update documentation - Improve detection/response
- Implement improvements - Technical and procedural changes
- Final report - Document for compliance records
7. Communication
Internal Communication
- Document all decisions with timestamps
- Keep incident log updated
- Use secure communication channels
External Communication
To affected clients (if deal data breach confirmed):
- Notify within 72 hours (GDPR requirement)
- Include: What happened, what data affected, what we're doing, what they should do
- Template in Appendix A
To regulators (if required):
- GDPR: Supervisory authority within 72 hours
- FADP: Swiss DPA notification as required
8. Evidence Preservation
Preserve immediately:
- System logs
- Database state (backup)
- Network traffic captures (if available)
- Screenshots of anomalies
Chain of custody:
- Document who accessed evidence and when
- Store copies in secure, separate location
- Hash files to prove integrity:
sha256sum <file>
9. Specific Scenarios
Scenario: Unauthorized Deal Data Access
- Identify which project(s) accessed
- Check audit logs for access scope
- Determine if data was exfiltrated
- Notify affected clients within 72 hours
- Document for compliance
Scenario: Ransomware
- Immediately isolate affected systems (network disconnect)
- Do NOT pay ransom
- Assess backup integrity
- Restore from clean backup
- Report to law enforcement
Scenario: DDoS Attack
- Enable additional rate limiting
- Block attacking IP ranges via UFW
- Contact Hostkey if upstream filtering needed
- Document attack characteristics
Scenario: Vulnerability Disclosure
- Acknowledge receipt to researcher within 24 hours
- Validate the vulnerability
- Develop and test fix
- Deploy fix
- Thank researcher, coordinate disclosure timing
10. Recovery Time Objectives
| Scenario | RTO | RPO |
|---|---|---|
| Hardware failure | 4 hours | 24 hours |
| Data corruption | 2 hours | 24 hours |
| Security breach | 24 hours | 0 (no data loss acceptable) |
| Complete site loss | 48 hours | 24 hours |
Appendix A: Client Notification Template
Subject: Security Notice from Dealspace
Dear [Client],
We are writing to inform you of a security incident that may have affected
data associated with your organization on the Dealspace platform.
WHAT HAPPENED
[Brief description of incident and date discovered]
WHAT INFORMATION WAS INVOLVED
[Types of data potentially affected - e.g., deal documents, participant info]
WHAT WE ARE DOING
[Steps taken to address the incident and prevent recurrence]
WHAT YOU CAN DO
[Recommended actions - e.g., notify deal participants, review access logs]
FOR MORE INFORMATION
Contact us at security@muskepo.com if you have questions.
We sincerely apologize for any concern this may cause.
Johan Jongsma
Founder, Dealspace
Appendix B: Incident Log Template
INCIDENT ID: INC-YYYY-MM-DD-001
SEVERITY: [Critical/High/Medium/Low]
STATUS: [Active/Contained/Resolved]
TIMELINE
- YYYY-MM-DD HH:MM - Initial detection
- YYYY-MM-DD HH:MM - [Action taken]
- YYYY-MM-DD HH:MM - [Action taken]
DESCRIPTION
[What happened]
AFFECTED SYSTEMS
[List systems]
AFFECTED DATA
[Description of data, deals/clients if known]
ROOT CAUSE
[How it happened]
RESOLUTION
[How it was fixed]
LESSONS LEARNED
[Improvements identified]
REPORTED BY: [Name]
RESOLVED BY: [Name]
Document end