- need screenshot for jira and postgres audit logs
- Need changes according to evidence
- Date, Names etc change,
This report documents a executed on 2 July 2025 to validate Optimsync’s incident‑response program and provide formal evidence for HIPAA (§ 164.306 / 308 / 316) and SOC 2 (CC 7.3‑7.5) controls. The exercise intentionally generated abnormal load against a development Cloud SQL instance, allowing the team to demonstrate detection, triage, containment, root‑cause analysis (RCA), and lessons‑learned processes. The artefacts referenced here will be uploaded to Drata and linked to controls (Security Events Tracked & Evaluated) and (Incident‑Response Lessons‑Learned Documented).
Dev Cloud SQL Noisy‑Query Table‑Top
Saqib (Incident Commander)
Development only – dev‑db Cloud SQL (PostgreSQL)
Sample PHI (non‑production)
Resolved (post‑mortem completed, CAPA in progress)
- Google Cloud Platform – Cloud SQL for PostgreSQL
- Optimsync Node.js/Express backend
- Optimsync React web application
- GCP IAM & Cloud Monitoring/Logging
- DEV‑337 – Incident workflow from Open → Investigating → RCA → Resolved.
- #alert (private) – declaration & updates.
- Fired via Cloud Monitoring webhook (High CPU / Execution‑Time policy).
Attached evidence proves that every stage was logged and time‑stamped in these systems.
Cloud Monitoring alert fires (CPU > 80 %, exec_time spike).
declares an incident in Slack; Jira DEV‑337 created.
Developer confirms abnormal query load; loop still running.
CPU = 85 %, 23 active connections – screenshots captured.
Triage comment added – scope dev only, sample PHI, prod safe.
Test user incident_test deleted via gcloud sql users delete; containment confirmed.
Metrics return to baseline; post‑containment chart captured.
Cloud SQL audit logs exported (downloaded-logs-20250702-200100.json).
Terraform PR opened to tighten DB IAM roles.
Incident moved to RCA phase; post‑mortem scheduled for 2025‑07‑03.
A deliberate workload of ~300 000 SELECT COUNT(*) statements were executed against the development Cloud SQL instance using user . The objective was to trigger monitoring thresholds and exercise the full incident workflow.
- Alert policies correctly detected CPU and query‑execution spikes within two minutes.
- The offending service account had unrestricted read access in dev, revealing a gap in our least‑privilege controls.
- Query Insights was disabled by default, adding overhead to log analysis.
Over‑privileged dev database role combined with intentionally generated high‑volume queries.
Deleted incident_test user (CLI output attached).
Enabled Query Insights on all dev Cloud SQL instances.
Merged Terraform changes enforcing least‑privilege DB roles.
Added CI lint rule to block unrestricted DB roles in future PRs.
- Monitoring thresholds and on‑call escalation functioned as designed.
- Role‑scoping gaps in dev can still present compliance risk.
- Post‑incident automation (CI lint, Query Insights) shortens investigation time.
Add Terraform least‑privilege module for Cloud SQL roles
Enable CI lint rule for DB IAM scopes
Enforce Query Insights on all dev Cloud SQL instances
Add automatic rollback plan to incident runbook
Timeline & alert screenshots
164.306(a‑d); 164.308(a)(1)(i)
Containment actions & audit logs
RCA & Lessons Learned (this section)
CAPA tracker & follow‑up tasks
-
- Jira export PDF (DEV‑337_incident.pdf)
High‑volume SELECT workload generated by test user incident_test.
The test role had unrestricted read access to the dev database.
The Terraform module for Cloud SQL roles lacked least‑privilege guardrails.
CI pipeline had no lint rule to check DB role scopes.
The requirement wasn’t captured in the SDLC security checklist.
over‑privileged dev DB role persisted in IaC.
no automated expiry for test credentials; Query Insights disabled in dev; missing CI lint rule for IAM changes.
- Monitoring alert triggered within 2 minutes.
- Slack/Jira workflow executed smoothly; responders and responsibilities were clear.
- Containment completed within 10 minutes; no production impact.
- Over‑privileged IAM role slipped through code review.
- No automated rollback for mistaken IAM changes.
- Initial log review was slower because Query Insights was disabled.
Add least‑privilege guardrails to Terraform Cloud SQL module
Implement CI lint rule for DB role scopes
Enable Query Insights on all dev Cloud SQL instances
Introduce auto‑expiry mechanism for test credentials
Post‑mortem held ; attendees: Saqib (Incident Commander), Abdul Manan (Developer), Taha (SecOps Lead).Approved by the Compliance Officer on .
Prepared by Optimsync Security & Compliance Team – 2025‑07‑03