Incident Response Process
How JobsiteOn handles security incidents, including detection, containment, communication timelines, and post-mortem procedures.
How JobsiteOn handles security incidents, including detection, containment, communication timelines, and post-mortem procedures.
This guide explains how JobsiteOn detects, responds to, and communicates about security incidents. Understanding our process helps you know what to expect if an incident affects your workspace.
Automated monitoring systems detect potential incidents through:
The on-call security team assesses:
Screenshot: A severity classification matrix showing four levels with definitions and response time commitments.
Affected systems are isolated to prevent further impact. This may include:
The root cause is identified and eliminated. Patches are applied and verified.
Systems are restored and verified to be operating normally. Additional monitoring is applied to confirm the incident is fully resolved.
| Severity | Notification timeline |
|---|---|
| Critical | Within 24 hours of confirmation |
| High | Within 72 hours of confirmation |
| Medium | In the next regular security advisory |
| Low | No individual notification (logged only) |
Animation: A timeline showing the six incident response phases from detection through communication, with time markers.
Every incident results in a written analysis that includes:
Tip: Subscribe to status page updates to receive real-time notifications during active incidents. See Check Platform Status.
Note: If you believe your workspace has been affected by a security incident, contact
security@jobsiteon.comimmediately. Do not wait for a notification.
Did this answer your question?