<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Shannon Winter</title>
    <description>The latest articles on Forem by Shannon Winter (@realshannyshan).</description>
    <link>https://forem.com/realshannyshan</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F121822%2Fd69a5f02-1936-41fe-aeeb-98fca6f68fc3.jpg</url>
      <title>Forem: Shannon Winter</title>
      <link>https://forem.com/realshannyshan</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/realshannyshan"/>
    <language>en</language>
    <item>
      <title>Behind the scenes of our security incident management process</title>
      <dc:creator>Shannon Winter</dc:creator>
      <pubDate>Wed, 13 Feb 2019 21:06:16 +0000</pubDate>
      <link>https://forem.com/atlassian/behind-the-scenes-of-our-security-incident-management-process-3pb6</link>
      <guid>https://forem.com/atlassian/behind-the-scenes-of-our-security-incident-management-process-3pb6</guid>
      <description>&lt;p&gt;On the security team, we don’t manage any Atlassian products like other Atlassian teams do. Our main product is trust, and that’s a job that’s never finished.&lt;/p&gt;

&lt;p&gt;To me, security is more of a mindset; one of constant diligence, continuous improvement, and seeking out ways to innovate.&lt;/p&gt;

&lt;p&gt;Sometimes security teams can act like more of a blocker than a facilitator, holding up products with burdensome gate checks. But my team strives to assist in the creation and management of secure software, making sure that teams can collaborate and get their work done in the safest way possible. When great products get shipped in a safe and secure way, we know we’ve done our job. To that end, there are three principles that guide our work and inform our action plans and responses to security incidents:&lt;/p&gt;

&lt;h2&gt;
  
  
  Our guiding principles
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fatlassianblog.wpengine.com%2Fwp-content%2Fuploads%2F2019%2F02%2Fmagnifying-glass%402x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fatlassianblog.wpengine.com%2Fwp-content%2Fuploads%2F2019%2F02%2Fmagnifying-glass%402x.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Be open and available
&lt;/h3&gt;

&lt;p&gt;No one benefits from a security team that works in the shadows or doesn’t share information. We know that if we want to be involved in the development of safe software we have to be approachable and available to everyone: engineering, support, partners, and customers. And we encourage anyone with a concern to &lt;a href="https://getsupport.atlassian.com/secure/Dashboard.jspa" rel="noopener noreferrer"&gt;&lt;u&gt;report it to us&lt;/u&gt;&lt;/a&gt;, no matter the severity of the issue or their role.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fatlassianblog.wpengine.com%2Fwp-content%2Fuploads%2F2019%2F02%2Fsimple-workflow%402x-e1550024154650.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fatlassianblog.wpengine.com%2Fwp-content%2Fuploads%2F2019%2F02%2Fsimple-workflow%402x-e1550024154650.png"&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Be consistent in word and action
&lt;/h3&gt;

&lt;p&gt;Being available to people wouldn’t mean much if we weren’t also consistent in how we approached our work. In order to preserve and enforce policies and procedures, we all need to be on the same page and act in predictable ways. We document how we work and then we share this information across our internal collaboration tools and with our broader customer and partner community. We also publish security stats, data, policies, and procedures on our public &lt;a href="https://www.atlassian.com/trust" rel="noopener noreferrer"&gt;&lt;u&gt;trust website&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fatlassianblog.wpengine.com%2Fwp-content%2Fuploads%2F2019%2F02%2Fsimplify%402x-e1550024220891.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fatlassianblog.wpengine.com%2Fwp-content%2Fuploads%2F2019%2F02%2Fsimplify%402x-e1550024220891.png"&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Always seek better ways
&lt;/h3&gt;

&lt;p&gt;Consistency doesn’t benefit anyone if we’re consistently, well, wrong. So we’re always striving to improve our monitoring, our tooling, our procedures, and to keep ahead of potential risks. We have a team whose main purpose is to study vulnerabilities in the wild and then come up with ways to fortify our systems against them so we’re not losing ground by constantly being in reaction mode.&lt;/p&gt;

&lt;h2&gt;
  
  
  Meet our team
&lt;/h2&gt;

&lt;p&gt;Security is built into all of our products and our processes which are shared across the company and the community. There are three main groups at Atlassian that work actively on preventing and responding to security incidents:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security Engineering.&lt;/strong&gt;  These are the people that review code and look into the security of our products, making sure that they uncover vulnerabilities and address them in a timely fashion, preferably before they ship! We want all of our products to be secure from the ground up. Often members of a product’s security engineering team are involved in the response to a security incident so they have the context they need when it comes to remediating the vulnerability.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security Intelligence.&lt;/strong&gt;  This team actively looks for suspicious things happening, or things that &lt;em&gt;could happen&lt;/em&gt;, on the entire network. They respond to reports from customers and partners, as well the as the internal teams they work with. This is the group that actively protects our products and systems against vulnerabilities and directly responds to incidents.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Policies and Trust.&lt;/strong&gt;  This team is responsible for the communications of our security rules and policies and they publish to the &lt;a href="https://www.atlassian.com/trust" rel="noopener noreferrer"&gt;&lt;u&gt;trust website&lt;/u&gt;&lt;/a&gt; I mentioned above. The information they publish is meant to be useful to the broader security and development community, not just Atlassian customers. Again, referring back to our three guiding principles, we want to make information available to everyone and break down the barriers that often surround security discussion.&lt;/p&gt;

&lt;h2&gt;
  
  
  How we build our stack
&lt;/h2&gt;

&lt;p&gt;People often ask us what we’re using in our own stack, especially as it pertains to security. We use a mix of our own products plus integrate with a few other best-of-breed tools. Being able to share information across the organization – and with partners and customers – is our first priority, so we naturally make sure that our stack is harmonized for this purpose.&lt;/p&gt;

&lt;p&gt;Here’s a list of products we use and how we use them:&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;Comprehensive detection and analysis: *&lt;/em&gt; We use &lt;a href="https://www.splunk.com/" rel="noopener noreferrer"&gt;Splunk&lt;/a&gt; to query our systems and uses heuristic analysis and anomaly detection based on policies our security intelligence team writes. When it comes to risk we want to cover all of our bases, so we write policies based on historical and theoretical incidents.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Agile communications loop:&lt;/strong&gt;  If we find something that just requires a quick fix we take care of it in the moment and then log what happened. But for something more involved we first record the incident in &lt;a href="https://www.atlassian.com/software/jira" rel="noopener noreferrer"&gt;Jira&lt;/a&gt;, and then also in Slack, for broader communication.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Connected conversations:&lt;/strong&gt;  Sometimes alerts come in from customers or partners via &lt;a href="https://www.atlassian.com/software/jira/service-desk" rel="noopener noreferrer"&gt;Jira Service Desk&lt;/a&gt; and then go to &lt;a href="https://www.opsgenie.com/" rel="noopener noreferrer"&gt;Opsgenie&lt;/a&gt; to alert the right people. These alerts are also sent to Jira, and then Slack, so transparency is broad and everyone has visibility.&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;Knowledge capture and transfer: *&lt;/em&gt; A lot of our playbooks are stored in &lt;a href="https://www.atlassian.com/software/confluence" rel="noopener noreferrer"&gt;Confluence&lt;/a&gt; and if we need to use any of them as a guide to a response we’ll reference them in the Jira ticket. From there, if a conversation also takes place in email, that information gets logged in Jira, too. And if the incident gets updated in Jira we’ll see that in Slack. We’ve created a really smooth way to make it so people can give input via the tool that makes the most sense for them and we don’t have to worry about people being left in a communication silo. Everyone can have access to everything.&lt;/p&gt;

&lt;h2&gt;
  
  
  How we respond
&lt;/h2&gt;

&lt;p&gt;We have a predefined way, following industry best practices, that we respond to incidents, and the security intelligence team spends a lot of time detailing these processes out and training people on how to follow them. We do this so we don’t react too quickly and make the wrong fix, but really take the time to investigate an incident and make sure we agree on the approach to remediation.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;*&lt;em&gt;Detect and analyze. *&lt;/em&gt; As I said before, this is something that the Security Intelligence team focuses a lot of our time on. We write queries, look for certain vulnerable services, and measure the severity of any issues so we can determine what our response will be.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Investigate.&lt;/strong&gt;  Once an issue has been detected, and we’ve got an idea of the nature of the issue, we’ll conduct an investigation to determine the severity and urgency of the issue. For this, we use the security classification system from the VERIS community. This helps us make sure we’re using our resources effectively and not over- or under-reacting to incidents.&lt;/li&gt;
&lt;li&gt;*&lt;em&gt;Contain and eradicate. *&lt;/em&gt; In fact, up until something is determined to be a threat, we don’t call it an incident. But once we make that determination, and we’ve classified it, we call on those planned responses that the Security Intelligence team spends so much of time creating. We figure out who’s vulnerable, build the fix, work with the product teams to get the patch ready and make sure it’s all ready to go.&lt;/li&gt;
&lt;li&gt;*&lt;em&gt;Communicate. *&lt;/em&gt; Once we have the fix ready to deploy we work with marketing, and sometimes legal, to make sure our communications to customers are timely and clear, and that everyone understands how to install the code fixes. Much of this work is done in Confluence where we can review the draft and make comments and edits and ensure the announcement is rock solid.&lt;/li&gt;
&lt;li&gt;*&lt;em&gt;Post-incident review. *&lt;/em&gt; After we’re confident the problem is fixed and everyone has what they need, we do a post-incident review, called a PIR, and we track this in Jira. This is usually a collection of tasks we assign ourselves to take care of any actions that we need to take, like any tweaks to our response process or any people who may need some new training, and we assign deadlines to these tasks. We do this within the first week of the incident when everything is sharp in our minds. After deploying the fix this is one of the best ways to make sure our products and systems are safe.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;We’ve published more detailed information about how our team &lt;a href="https://www.atlassian.com/trust/security/security-incident-management" rel="noopener noreferrer"&gt;responds to incidents here in the Trust section of the website.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As you can see, everyone at Atlassian takes security pretty seriously and we devote a lot of effort to making sure we have dedicated teams that build safe software and maintain our systems to keep them as secure as possible. And we think that focusing on the three guiding values—being open and available, being consistent, and always seek better ways—is a great approach for building trust with our community.&lt;/p&gt;

&lt;p&gt;The post &lt;a href="https://www.atlassian.com/blog/inside-atlassian/our-security-incident-management-process" rel="noopener noreferrer"&gt;Behind the scenes of our security incident management process&lt;/a&gt; appeared first on &lt;a href="https://www.atlassian.com/blog" rel="noopener noreferrer"&gt;Atlassian Blog&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>insideatlassian</category>
      <category>it</category>
      <category>enterprise</category>
      <category>incidentmanagement</category>
    </item>
    <item>
      <title>194 years of downtime: looking back on incident data from 2018</title>
      <dc:creator>Shannon Winter</dc:creator>
      <pubDate>Thu, 13 Dec 2018 16:55:11 +0000</pubDate>
      <link>https://forem.com/atlassian/194-years-of-downtime-looking-back-on-incident-data-from-2018-3j85</link>
      <guid>https://forem.com/atlassian/194-years-of-downtime-looking-back-on-incident-data-from-2018-3j85</guid>
      <description>&lt;p&gt;Statuspage customers logged more than 194 years of collective incidents in 2018. That’s a whopping 87% increase from the &lt;a href="https://www.atlassian.com/blog/statuspage/104-years-downtime-looking-year-statuspage-incident-data?utm_source=social&amp;amp;utm_medium=devto" rel="noopener noreferrer"&gt;104 years logged in 2017&lt;/a&gt;, and we aren’t even through December yet.&lt;/p&gt;

&lt;p&gt;Open incident communication is becoming more and more important to companies and their customers. This is underlined by the big names who have set up a public Statuspage this year like &lt;a href="https://www.githubstatus.com/" rel="noopener noreferrer"&gt;Github&lt;/a&gt;, &lt;a href="https://linkedin.statuspage.io/" rel="noopener noreferrer"&gt;LinkedIn&lt;/a&gt;, and &lt;a href="https://status.developer.yelp.com/" rel="noopener noreferrer"&gt;Yelp&lt;/a&gt;. With more focus on incident communication comes more focus on incident management in general. Companies are spending more time and resources preparing for downtime, as we learned from a handful of customers we profiled on &lt;a href="https://www.atlassian.com/blog/it-teams/how-to-prepare-for-cyber-monday?utm_source=social&amp;amp;utm_medium=devto" rel="noopener noreferrer"&gt;how they prepare for high traffic days&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;We dug deeper into our 2018 data to get a better idea of when and how our customers communicated around downtime this year. The data represents all reported incidents – from small blips in service to large-scale outages – plus any planned downtime logged through scheduled maintenance.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fatlassianblog.wpengine.com%2Fwp-content%2Fuploads%2F2018%2F12%2Ffinal_blog_-annual-downtime-report.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fatlassianblog.wpengine.com%2Fwp-content%2Fuploads%2F2018%2F12%2Ffinal_blog_-annual-downtime-report.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What the numbers mean
&lt;/h2&gt;

&lt;p&gt;Sure, the sharp increase in hours of incidents logged from 2017 to 2018 can in part be attributed to an increase in total number of Statuspage customers, but we also believe it reflects the increasingly cloud-first mentality of companies relying on SaaS products. Companies are choosing to communicate around these incidents, and customers have come to expect this type of transparency.&lt;/p&gt;

&lt;p&gt;&lt;iframe class="tweet-embed" id="tweet-1018273597045932032-59" src="https://platform.twitter.com/embed/Tweet.html?id=1018273597045932032"&gt;
&lt;/iframe&gt;

  // Detect dark theme
  var iframe = document.getElementById('tweet-1018273597045932032-59');
  if (document.body.className.includes('dark-theme')) {
    iframe.src = "https://platform.twitter.com/embed/Tweet.html?id=1018273597045932032&amp;amp;theme=dark"
  }



&lt;/p&gt;

&lt;p&gt;In addition to the jump in number of incidents logged this year,  &lt;strong&gt;we also saw the average number of updates per incident nearly double.&lt;/strong&gt;  With an average of 4.4 updates per incident this year, we believe that companies are prioritizing frequent, transparent communication with their customers.&lt;/p&gt;

&lt;p&gt;We were also surprised to see that nearly half of our customers (45% to be exact) have opted into some form of page automation by integrating with an alerting or monitoring tool. While we advocate for always &lt;a href="https://help.statuspage.io/knowledge_base/topics/should-you-automate-your-status-page" rel="noopener noreferrer"&gt;keeping a human element in your incident comms process&lt;/a&gt;, setting up some level of automation can definitely save time when it matters most. Many customers take this hybrid manual/automated approach to save time without risking a poor customer experience.&lt;/p&gt;

&lt;p&gt;While incidents logged and updates posted are rising, there are still very few postmortems written – only 3% of incidents logged in Statuspage over 2018 had a postmortem attached. This isn’t too surprising, as not every incident requires a postmortem (and some companies write postmortems on a company blog instead), but we imagine this percentage rising over 2019 as customers come to expect this type of follow-up.&lt;/p&gt;

&lt;p&gt;&lt;iframe class="tweet-embed" id="tweet-1068941649890275328-37" src="https://platform.twitter.com/embed/Tweet.html?id=1068941649890275328"&gt;
&lt;/iframe&gt;

  // Detect dark theme
  var iframe = document.getElementById('tweet-1068941649890275328-37');
  if (document.body.className.includes('dark-theme')) {
    iframe.src = "https://platform.twitter.com/embed/Tweet.html?id=1068941649890275328&amp;amp;theme=dark"
  }



&lt;/p&gt;

&lt;h2&gt;
  
  
  Stand-out incidents
&lt;/h2&gt;

&lt;p&gt;There are some days when downtime is more likely for certain companies or industries. &lt;a href="https://www.atlassian.com/blog/it-teams/how-to-prepare-for-cyber-monday?utm_source=social&amp;amp;utm_medium=devto" rel="noopener noreferrer"&gt;Cyber Monday&lt;/a&gt; is one example – a day where e-commerce companies see an exponential increase in traffic to their websites or apps. For &lt;strong&gt;Amazon&lt;/strong&gt;, Prime Day (their biggest sale of the year) is that day – rivaling even the craziest Black Friday and Cyber Monday traffic. Though the retail giant still achieved a record year in sales, shoppers had trouble connecting to Amazon.com for over an hour, causing a lot of customer frustration and an estimate of up to &lt;a href="https://www.businessinsider.com/amazon-prime-day-website-issues-cost-it-millions-in-lost-sales-2018-7" rel="noopener noreferrer"&gt;100 million dollars in revenue loss&lt;/a&gt;. The silver lining was a flood of cute dog pictures on Twitter, &lt;a href="https://www.atlassian.com/blog/statuspage/error-pages?utm_source=social&amp;amp;utm_medium=devto" rel="noopener noreferrer"&gt;showcasing the power of a great error page&lt;/a&gt;:&lt;/p&gt;

&lt;p&gt;&lt;iframe class="tweet-embed" id="tweet-1018935253543636992-798" src="https://platform.twitter.com/embed/Tweet.html?id=1018935253543636992"&gt;
&lt;/iframe&gt;

  // Detect dark theme
  var iframe = document.getElementById('tweet-1018935253543636992-798');
  if (document.body.className.includes('dark-theme')) {
    iframe.src = "https://platform.twitter.com/embed/Tweet.html?id=1018935253543636992&amp;amp;theme=dark"
  }



&lt;/p&gt;

&lt;p&gt;For &lt;strong&gt;Epic Games&lt;/strong&gt; , their “prime” traffic days came as players flocked to play their very popular video game, Fortnite. They experienced periods where over 3 million gamers were playing concurrently, resulting in some big service interruptions. During an incident in June, players from all over the world headed to Epic Game’s &lt;a href="https://status.epicgames.com/" rel="noopener noreferrer"&gt;status page&lt;/a&gt; to see what was going on, resulting in a peak of about 15,000 requests &lt;em&gt;per second.&lt;/em&gt;(Our most highly trafficked incident to date.) Major kudos to Epic Games for writing very&lt;a href="https://www.epicgames.com/fortnite/en-US/news/postmortem-of-service-outage-at-3-4m-ccu" rel="noopener noreferrer"&gt; thorough postmortems&lt;/a&gt; to close the loop on big incidents.&lt;/p&gt;

&lt;p&gt;Some form of downtime is inevitable – especially with an extreme load like the one Fortnite experiences. Epic Games shows us that it’s how you handle that downtime and communicate with your customers that really matters.&lt;/p&gt;

&lt;p&gt;And we can’t forget the &lt;strong&gt;IRS&lt;/strong&gt; , which had an unusually stressful 2018 Tax Day when their website crashed on April 17th, the tax filing deadline. This was highly problematic as &lt;a href="https://www.accountingtoday.com/opinion/what-the-irs-2018-tax-day-website-outage-cost-in-dollars" rel="noopener noreferrer"&gt;approximately 10 million Americans wait to submit their taxes on the last day&lt;/a&gt;. They ended up extending the deadline to April 18th, but communication in the meantime wasn’t exactly ideal. The original IRS error message reported a planned downtime event from April 17th, 2018 to Dec 31st, 9999 – yikes.&lt;/p&gt;

&lt;p&gt;Downtime happens to the best of us, but accurate and frequent updates go a long way. &lt;a href="https://www.atlassian.com/blog/statuspage/downtime-taxes-open-letter-irs?utm_source=social&amp;amp;utm_medium=devto" rel="noopener noreferrer"&gt;We wrote an open letter to the IRS&lt;/a&gt; offering some advice and a free Statuspage – offer valid until Tax Day 2019. We’re still waiting for them to take us up on it.  &lt;/p&gt;

&lt;h2&gt;
  
  
  #HugOps for 2019
&lt;/h2&gt;

&lt;p&gt;While there may have been more hours of downtime this year, there was also &lt;a href="https://www.statuspage.io/hugops?utm_source=social&amp;amp;utm_medium=devto" rel="noopener noreferrer"&gt;a lot more love and appreciation (#HugOps)&lt;/a&gt; shown to the companies who were open about the bad times – more than 7,000 tweets and retweets mentioning HugOps, in fact. We started sending actual HugOps posters to people who retweeted our digital HugOps posters, and have sent more than 70 this year. That means 1% of all HugOps tweeters are now proudly displaying a Statuspage HugOps poster in their office like the one below – hooray!&lt;/p&gt;

&lt;p&gt;&lt;iframe class="tweet-embed" id="tweet-1038357208948502529-775" src="https://platform.twitter.com/embed/Tweet.html?id=1038357208948502529"&gt;
&lt;/iframe&gt;

  // Detect dark theme
  var iframe = document.getElementById('tweet-1038357208948502529-775');
  if (document.body.className.includes('dark-theme')) {
    iframe.src = "https://platform.twitter.com/embed/Tweet.html?id=1038357208948502529&amp;amp;theme=dark"
  }



&lt;/p&gt;

&lt;h2&gt;
  
  
  The latest in Atlassian for incident management
&lt;/h2&gt;

&lt;p&gt;While incident communication is a large part of incident management, it’s only one piece of a bigger puzzle. At Atlassian we’ve doubled down on our investment in incident management tools and &lt;a href="https://www.atlassian.com/software/jira/ops/handbook?utm_source=social&amp;amp;utm_medium=devto" rel="noopener noreferrer"&gt;practices&lt;/a&gt;. Check out what we’ve been up to:&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;Postmortems for *&lt;/em&gt; &lt;a href="https://www.atlassian.com/software/jira/ops?utm_source=social&amp;amp;utm_medium=devto" rel="noopener noreferrer"&gt;*&lt;em&gt;Jira Ops: *&lt;/em&gt;&lt;/a&gt;One of the most important parts of the incident management process is the postmortem. This is where incident response teams can learn, improve, and collect all the returns for the time and investment made trying to resolve the incident. Unfortunately, the postmortem process is often neglected because it’s too time consuming and difficult to manage. A key time-saver with JiraOps postmortems is the incident timeline, which gathers all the key events from the incident in chronological order. Teams can analyze what happened, identify root causes, and create Jira Software issues directly from the postmortem to ensure actions are taken to improve from every incident. &lt;a href="https://www.atlassian.com/blog/announcements/announcing-postmortems-jira-ops?utm_source=social&amp;amp;utm_medium=devto" rel="noopener noreferrer"&gt;Learn more&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;Automation Actions for *&lt;/em&gt; &lt;a href="https://www.atlassian.com/software/opsgenie?utm_source=social&amp;amp;utm_medium=devto" rel="noopener noreferrer"&gt;*&lt;em&gt;Opsgenie: *&lt;/em&gt;&lt;/a&gt;Incident responders often take predictable, repetitive actions in response to an alert. These actions might include gathering more info about a particular system, running network diagnostics, increasing cloud resources, or restarting a service. Automation Actions enable you to run automated scripts and playbooks via 3rd-party platforms. Opsgenie now offers support for two automation integration methods: AWS Systems Manager and Generic REST Endpoint. Teams can integrate with these platforms to trigger the automated tasks right from the Opsgenie console or mobile app. This saves responders time, reduces the number of applications they need to use during incident response, and can positively impact MTTR. &lt;a href="https://www.opsgenie.com/blog/incident-response-with-aws-systems-manager" rel="noopener noreferrer"&gt;Learn more.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://twitter.com/share?text=194%20years%20of%20downtime:%20@Statuspage%20looks%20back%20on%20incident%20data%20from%202018&amp;amp;url=https://www.atlassian.com/blog/?p=41853" rel="noopener noreferrer"&gt;Tweet this report, get a poster&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Anyone who tweets will receive a free HugOps poster to display as a reminder that your team is supported when downtime strikes in 2019…&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;This article appeared first on &lt;a href="https://www.atlassian.com/blog?utm_source=social&amp;amp;utm_medium=devto" rel="noopener noreferrer"&gt;Atlassian Blog&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>outage</category>
      <category>devops</category>
    </item>
  </channel>
</rss>
