This document explains some of the key concepts in information security risk management, as well as explaining how to carry out the actions required by Sourcegraph’s Information Security Risk Management Policy.
Knowledge of the policy, including details of the required actions and definitions of key terms, is assumed within this document. In other words, please read the policy if you haven't already!
Sourcegraph's security team maintains an information security risk register tracked in our GRC tool. This risk register tracks high-level issues which could affect the confidentiality, integrity, or availability of the data Sourcegraph manages. As it is high-level, the risk register does not contain specific technical vulnerabilities. Instead, it tracks security concerns which require medium- to long-term effort to rectify.
The risk register is the source of truth for Sourcegraph’s information security risks. To edit the Risk Register, you must be a member of the Security team; if you do not have access and believe you might require it, email [email protected].
This section outlines how risks are identified, when assessments are conducted, and the methodologies used to evaluate and manage risks.
Information security risks can be identified in one of two ways:
Ad-Hoc Risk Identification:
Employees can report potential risks at any time by emailing details to [email protected]. The Security team member on the support rota ensures that:
Security team members are also free to raise and triage risks in this manner as required.
Scheduled Risk Identification:
Risks may also be identified during quarterly risk review sessions or through ongoing assessments conducted by the Security team. These reviews ensure that new risks are identified systematically and existing risks remain relevant.
In addition to quarterly assessments, risk assessments may also be initiated in response to specific events or triggers that could indicate a shift in the organization's risk landscape. These triggers include: