2026-01-01
This policy defines how RevLog identifies, responds to, and recovers from security incidents affecting our wiki service and related infrastructure. It ensures compliance with GDPR breach notification requirements and establishes clear procedures for incident handling.
This policy applies to:
| Term | Definition |
|---|---|
| Security incident | Any event that compromises the confidentiality, integrity, or availability of systems or data |
| Personal data breach | A security incident involving unauthorised access, disclosure, alteration, or destruction of personal data |
| Near miss | An event that could have resulted in an incident but was prevented or detected before impact |
| Role | Responsibilities |
|---|---|
| Incident Lead | Coordinates response, makes decisions, communicates with stakeholders |
| Technical Responder | Investigates, contains, and remediates technical issues |
| Communications Lead | Handles user and external notifications |
For RevLog, these roles may be held by the same person depending on team size.
Primary contact: revlog@unige.ch
Goal: Detect and confirm incidents as quickly as possible.
Detection sources:
Actions:
Goal: Limit the impact and prevent further damage.
Short-term containment:
Long-term containment:
Do not:
Goal: Remove the root cause of the incident.
Actions:
Goal: Restore normal operations safely.
Actions:
Goal: Learn from the incident and improve defences.
Actions (within 5 business days of resolution):
| Severity | Description | Response Time | Examples |
|---|---|---|---|
| Critical | Major breach, data exfiltration, complete service outage | Immediate (< 1 day) | Database compromise, ransomware, mass data leak |
| High | Significant impact, potential data exposure, partial outage | < 2 day | Admin account compromise, targeted attack, authentication bypass |
| Medium | Limited impact, contained threat, degraded service | < 1 week | Single account compromise, failed intrusion attempt, suspicious activity |
| Low | Minimal impact, near miss, policy violation | < 2 weeks | Misconfiguration detected, minor policy breach, spam |
Under GDPR Article 33-34, personal data breaches must be reported:
Deadline: Within 72 hours of becoming aware of a breach (if it poses a risk to individuals).
Report to:
Report must include:
Required when: The breach is likely to result in a high risk to individuals' rights and freedoms.
Notification must include:
Template: See Appendix A
| Audience | When to Notify | Method |
|---|---|---|
| Affected users | High-risk breaches, service outages | Email, wiki notice |
| UNIGE IT Security | All significant incidents | Email, phone |
| SWITCH Security | Federation-related incidents | sectort@switch.ch |
| Supervisory authority | Personal data breaches (per GDPR) | Official reporting form |
For all incidents, preserve:
Store evidence securely and maintain chain of custody documentation for potential legal proceedings.
RevLog Incident Response
Email: revlog@unige.ch
UNIGE IT Security (if applicable)
[UNIGE security contact]
SWITCH CERT
Email: cert@switch.ch
https://www.switch.ch/security/
Subject: Security Incident Notification — Action May Be Required
Dear [User],
We are writing to inform you of a security incident affecting the RevLog wiki service.
What happened:
[Brief description of the incident]
What data was affected:
[Types of data involved]
What we are doing:
[Steps taken to contain and remediate]
What you should do:
[Recommended actions, e.g., review account activity, be alert for phishing]
Questions?
Contact us at revlog@unige.ch
We sincerely apologise for any concern this may cause and are committed to protecting your data.
RevLog Team
| Field | Details |
|---|---|
| Incident ID | INC-[YYYY]-[NNN] |
| Date/time detected | |
| Date/time reported | |
| Reported by | |
| Severity | Critical / High / Medium / Low |
| Status | Open / Contained / Resolved / Closed |
| Summary | |
| Affected systems | |
| Affected users | |
| Root cause | |
| Actions taken | |
| GDPR notification required | Yes / No |
| Notification sent | Date, recipient |
| Post-mortem completed | Yes / No |
| Lessons learned |