security-incident-response

Security incident workflow for triage, containment, eradication, and recovery evidence handling. Use when suspected or confirmed security incidents require coordinated response actions; do not use for proactive threat modeling or routine vulnerability backlog grooming.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "security-incident-response" with this command: npx skills add kentoshimizu/sw-agent-skills/kentoshimizu-sw-agent-skills-security-incident-response

Security Incident Response

Overview

Use this skill to run a structured response that minimizes blast radius, preserves evidence, and restores service safely.

Scope Boundaries

  • Indicators of compromise or security alerts require investigation.
  • Active abuse is suspected and containment decisions are needed.
  • Security incident communications and recovery criteria must be formalized.

Templates And Assets

  • Incident timeline template:
    • assets/security-incident-timeline-template.md

Inputs To Gather

  • Detection source, initial evidence, and confidence level.
  • Affected systems, data classes, and business criticality.
  • Available responders and escalation contacts.
  • Legal/compliance notification obligations and time limits.

Deliverables

  • Incident timeline with key decisions and evidence references.
  • Containment and eradication action plan with owner and deadline.
  • Stakeholder communication record and regulatory decision log.
  • Recovery validation checklist and follow-up prevention actions.

Workflow

  1. Classify severity using impact, exploitability, and blast-radius evidence.
  2. Start timeline capture with assets/security-incident-timeline-template.md.
  3. Establish a command structure (incident lead, forensic owner, comms owner).
  4. Contain actively exploited paths first, preserving forensic artifacts before destructive cleanup when feasible.
  5. Scope affected identities, services, data stores, and downstream dependencies.
  6. Eradicate root access path, rotate exposed credentials, and patch exploited weaknesses.
  7. Recover in staged rollout with explicit rollback criteria and heightened monitoring.
  8. Publish a post-incident action list with prevention owners and due dates.

Quality Standard

  • Severity classification is evidence-based and revisited as facts evolve.
  • Containment actions are traceable and reversible when possible.
  • Evidence handling preserves chain-of-custody requirements.
  • Recovery criteria include security validation, not only availability checks.

Failure Conditions

  • Stop when roles and decision authority are unclear.
  • Stop when evidence is being destroyed without explicit incident lead approval.
  • Escalate when potential legal notification thresholds are crossed.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

security-authentication

No summary provided by upstream source.

Repository SourceNeeds Review
Security

security-secure-coding

No summary provided by upstream source.

Repository SourceNeeds Review
Security

security-authorization

No summary provided by upstream source.

Repository SourceNeeds Review
Security

kubernetes-security

No summary provided by upstream source.

Repository SourceNeeds Review