Incident Response Procedure
Incident Response Procedure – Freeck
Last updated: 2025-02-10
This procedure defines how security incidents and personal-data breaches are handled.
1. Definition of an Incident
An incident includes (non-exhaustive):
- Unauthorized access to Firebase data
- Firestore rules misconfiguration
- Exposure of personal data
- Compromise of QR signing keys
- Offline data tampering
- Data loss affecting users
- Suspicious authentication behavior
2. Severity Levels
Level 1 – Minor
- No personal data involved
- Local bug or small issue
Action: Fix in upcoming release, document internally.
Level 2 – Medium
- Potential but unconfirmed security flaw
- Limited exposure risk
Action:
- Investigate within 48 hours
- Patch if needed
- Document incident and resolution
Level 3 – Major (Personal Data Breach)
- Confirmed personal-data breach
- Key compromise or large-scale incident
Action:
- Immediate containment (revoke keys, tighten rules, disable features)
- Assess scope and impacted data
- Notify users if breach is likely to result in a high risk to their rights
- Notify the Belgian DPA (APD) within 72 hours when required (GDPR Art. 33)
- Perform full post-mortem
3. Incident Response Workflow
-
Detection
- Monitoring (Firebase, logs)
- User reports
- Internal QA findings
-
Assessment
- Identify affected components (Firestore, Auth, offline DB…)
- Determine severity level
- Decide on immediate containment steps
-
Containment
- Revoke compromised tokens/keys
- Temporarily disable affected functionality
- Adjust Firestore rules if needed
-
Eradication
- Fix root cause (code/infra)
- Validate that vulnerability is closed
- Clean up residual malicious data if any
-
Recovery
- Restore normal service
- Monitor for regressions
-
Notification
- Users (when high risk to rights/freedoms)
- Authorities (when required under GDPR)
-
Post-Incident Review
- Document incident details, timeline, root cause, and fixes
- Update this procedure or architecture to prevent recurrence
4. Responsibilities
- The developer (controller) is responsible for handling incidents end-to-end.
- All incidents of Level 2 and 3 must be recorded in an internal log.
5. Contact
security@[domain]