Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Contingency-Related Actions:

The following are a list of various actions that can be taken in order to respond to various scenarios.  After this section, we will describe scenarios and which of these documents the actions apply to.

Earthdata Search Architecture info can be found here: Earthdata Search

how to re-run CI/CD for EDSC (rebuild/redeploy)

...

how to backup and restore database for EDSC:

how to restore sourcecode:

  • Bitbucket mirrors GitHub repository (both use git so we can restore with the main trunk history)

how to restore github:

  • Github is being backed up and there is a process to request a restoration (Bitbucket repository mirrors the master branch)

Scenarios:

  • AWS Access Key is compromised.  If an AWS Access Key is compromised, it could give hackers access to some AWS resources.  Here are remediation steps:
    • revoke access key and create a new one
    • replace environmental variables (Bamboo variables) referencing the access key with the new one 
    • re-run CI/CD for EDSC (rebuild/redeploy)
  • Malicious NPM Package.  If there is a truly dangerous version of an NPM that we list in our dependencies, we can take the following steps to remediate:
    • how to pin or update dependency versions
    • back-port vulnerability fixes
  • Github Hacked.  If our Github repository is hacked, we can take the following steps:
    • Notify security
    • Once we have our access restored, we can restore our source code to a prior version that is mirrored in our Bitbucket repository
  • Database Corrupted:


contact tree (aka phone tree):