Skip to main content

Remediation scenarios and workflows

This guide covers different remediation scenarios you'll encounter and provides practical workflows for each. Choose the approach that matches your specific situation and organizational constraints.

Understanding incident types

Not all incidents are created equal. The remediation approach depends heavily on when and how the secret was detected:

Real-time incidents

Real-time incidents are detected as they happen - when developers commit secrets to repositories you're actively monitoring.

Characteristics:

  • Recent exposure (minutes to hours old)
  • Developer context is fresh and available
  • Higher probability of being valid and actively used
  • Opportunity for immediate intervention

Key considerations:

  • Developer is likely still working on the code
  • Secret may be needed for current development work
  • Faster remediation possible with developer involvement
  • Prevention opportunity through education

Historical incidents

Historical incidents are discovered during scans of existing repositories - secrets that have been present for days, months, or years.

Characteristics:

  • Older exposure (potentially years old)
  • Developer context may be lost
  • Unknown validity and current usage
  • May require investigation to understand impact

Key considerations:

  • Original developer may no longer be available
  • Secret usage patterns may have changed
  • Potential for widespread distribution
  • Requires systematic prioritization approach

Remediation scenarios

Depending on the incident nature and the context surfaced, you might fall in one of these different scenarios:

Scenario 1: Emergency response (public exposure)

Use for: Secrets detected in public repositories with immediate security impact.

Approach:

  1. Rapid assessment - Confirm ownership and access level
  2. Immediate revocation - Disable secret immediately
  3. Impact containment - Update critical systems
  4. Post-incident analysis - Understand how exposure occurred

Timeline: 5-15 minutes
Success factors: Clear escalation paths, revocation procedures

Scenario 2: Real-time incident with active developer

Use for: Newly detected secrets where the developer is available and context is fresh.

Approach:

  1. Immediate engagement - Contact developer while context is fresh
  2. Quick assessment - Understand intended use and scope
  3. Guided remediation - Walk through proper secret management
  4. Prevention - Education to prevent future occurrences

Timeline: 15-30 minutes
Success factors: Developer availability, clear communication, established processes

Detailed workflow →

Scenario 3: Historical incident requiring investigation

Use for: Older secrets with unknown context, validity, or current usage.

Approach:

  1. Systematic prioritization - Focus on high-impact secrets first
  2. Context reconstruction - Investigate purpose and current usage
  3. Stakeholder identification - Find current owners/users
  4. Phased remediation - Address in priority order

Timeline: Hours to days per incident
Success factors: Good investigation tools, clear prioritization criteria

Detailed workflow →

Scenario 4: Bulk remediation (post-historical scan)

Use for: Large volumes of historical incidents requiring systematic approach.

Approach:

  1. Automated triage - Use filters and automation to categorize
  2. Batch processing - Group similar incidents for efficiency
  3. Team coordination - Distribute work across teams
  4. Progress tracking - Monitor completion rates and blockers

Timeline: Weeks to months
Success factors: Automation tools, team coordination, management support

Workflow selection guide

SituationPrimary ScenarioSecondary Considerations
New commit detected with secretReal-time with active developerCheck if public repository
Historical scan reveals 500+ incidentsBulk remediationPrioritize by criticality first
Secret found in public GitHubEmergency responseMay also need bulk approach if widespread
Valid secret, unknown usageHistorical investigationConsider developer engagement if possible
Test/dummy secretQuick resolutionMay use bulk processing

Platform features supporting scenarios

Our platform comes with several integrated features which can help you in addressing these different scenarios:

Emergency response

  • Integrated revocation - Disable secrets directly from GitGuardian
  • Public leak detection - Identify external exposure
  • Priority alerts - Escalate critical incidents immediately

Real-time workflow

  • Instant notifications - Alert relevant stakeholders immediately
  • Developer sharing - Provide direct access to incident details
  • Feedback collection - Gather developer input on false positives
  • Auto-healing - Allow developers to resolve incidents independently

Historical workflow

  • Bulk operations - Process multiple incidents efficiently
  • Advanced filtering - Find high-priority incidents quickly
  • Presence checking - Verify if secrets still exist in repositories
  • Validity checking - Test if secrets are still active

Next steps

Choose the detailed workflow that matches your situation: