Incident Response Plan
This document defines severity levels, response procedures, communication protocols, and post-incident review processes for Conduit security incidents.
Severity levels
| Level | Definition | Example | Response time |
|---|---|---|---|
| P1 | Active data breach or unauthorized access to MLS data | API key compromise, RLS bypass, unauthorized listing data exposure | Immediate (within 1 hour) |
| P2 | Vulnerability discovered that could lead to breach | Missing RLS policy, auth bypass in staging, credential exposure in logs | Within 4 hours |
| P3 | Security degradation without immediate exploit risk | Rate limiting failure, audit log gap, billing miscalculation | Within 24 hours |
| P4 | Minor security improvement or hardening opportunity | Dependency update, header hardening, logging improvement | Next development cycle |
Immediate response procedures
P1: Active breach response
P2: Vulnerability response
Kill switch procedure
[!!]Emergency use only
Path A: Dashboard (preferred)
Navigate to MLS Dashboard → Vendor Management → select vendor → click "Suspend Access". Takes effect within 300 seconds (KV cache TTL).
Path B: Direct database (emergency)
If dashboard is unavailable or immediate effect is required:
-- Suspend specific vendor access to specific MLS
UPDATE mls_vendor_access
SET status = 'suspended', updated_at = now()
WHERE vendor_id = '<vendor_profile_id>'
AND mls_id = '<mls_profile_id>';
-- Nuclear option: suspend ALL vendor access to an MLS
UPDATE mls_vendor_access
SET status = 'suspended', updated_at = now()
WHERE mls_id = '<mls_profile_id>';Direct database updates bypass KV cache and take effect on the next governance context lookup (cache miss or TTL expiry). To force immediate effect, manually evict the affected governance context keys from Cloudflare KV.
Communication
MLS administrators — Notified within 4 hours of P1 incidents affecting their data. Email with incident summary, affected data scope, and remediation steps. Follow-up within 24 hours with root cause analysis.
Vendors — Notified if their credentials were compromised or if their access was suspended. Include clear next steps for credential rotation.
Board/stakeholder reports — P1 and P2 incidents produce a formal incident report within 7 days. Report includes: timeline, root cause, blast radius, remediation actions, and controls added to prevent recurrence.
Post-incident review
Root cause analysis — Every P1 and P2 incident receives a formal RCA within 7 days. Blameless format focused on system improvements, not individual fault.
Controls update — Identified gaps are addressed with new controls, tests, or monitoring. Changes are tracked as security work orders with verification evidence.
Publication — Material incidents are documented in a public security advisory (after remediation is complete) to maintain transparency with MLS partners.