Skip to content

Operations security

Index of the procedures that implement the Operations Security Policy.

The Operations Security Policy is published in the Changineers trust portal. This page is the handbook index for the procedures that implement it.

Production systems are configured to a known baseline, kept current with patches, segmented at the network layer, and monitored continuously. Changes to production go through a controlled process with approval and rollback. Vulnerabilities that surface from any source are detected, triaged, and remediated.

TopicPage
Production changes: proposing, reviewing, and deployingChange management
Manual production changes when the standard process can’t be followedEmergency change
Configuration baselines for AWS resources, VMs, network controls, Cognito, and engineer laptopsConfiguration baselines
Metrics, logs, traces, and alarmsObservability
Authentication anomalies, account intrusion detection, audit loggingThreat detection
Vulnerability detection, triage, severity, and remediationVulnerability management

Production AWS resources are defined as code in Terraform; changes go through the release pull request flow on Change management.

Engineers who need elevated AWS access for an exceptional case request it through AWS IAM Identity Center, federated from Google Workspace, with approval by the CTO. See Change management § Authorised actors.