Runbooks: step-by-step procedures¶
Reactive procedures for specific incidents: something has happened, or is happening, and you need to know the sequence of steps to contain it, assess the damage, and recover. Each runbook answers the question “Something is broken. How do I fix it?”
Runbooks:
- Set up a password manager
- Enable two-factor authentication
- Enable device encryption
- Block IoT internet access with VLANs (Guest network method)
- Stop tracking and sharing personal info via photos
- How (and why) to reset your advertising ID regularly
- The most thorough cleaning method (using ExifTool)
- Submit a GDPR deletion request
- Run a periodic access review
- Handle research participant data
- Disable Chrome’s Topics API
- Account compromise response
- Phishing click response
- Doxxing response
- Respond to a suspected data breach
- Vendor breach response
- After device seizure
- Responding to a legal demand for data
- Data subject request response
- Reclaim your primary email account