Introduction

This document explains some of the key concepts in information security risk management, as well as explaining how to carry out the actions required by Sourcegraph’s Information Security Risk Management Policy.

Knowledge of the policy, including details of the required actions and definitions of key terms, is assumed within this document. In other words, please read the policy if you haven't already!

Risk register

Sourcegraph's security team maintains an information security risk register tracked in our GRC tool. This risk register tracks high-level issues which could affect the confidentiality, integrity, or availability of the data Sourcegraph manages. As it is high-level, the risk register does not contain specific technical vulnerabilities. Instead, it tracks security concerns which require medium- to long-term effort to rectify.

The risk register is the source of truth for Sourcegraph’s information security risks. To edit the Risk Register, you must be a member of the Security team; if you do not have access and believe you might require it, email [email protected].

Risk Identification, Assessment Schedule, and Methodology

This section outlines how risks are identified, when assessments are conducted, and the methodologies used to evaluate and manage risks.

Risk identification

Information security risks can be identified in one of two ways:

Risk Assessment Triggers

In addition to quarterly assessments, risk assessments may also be initiated in response to specific events or triggers that could indicate a shift in the organization's risk landscape. These triggers include: