Account 로그인

Policies and guidelines

Red Hat Information Security Incident Response Team RFC 2350 Profile

Jump to section



1. Document Information

This document is compliant with RFC 2350.

1.1. Date of Last Update

This is version 1.2 as of November 18, 2022.

1.2. Distribution List for Notifications

There is no distribution list for notifications.

Please inquire about updates via the RH-ISIRT email address:

1.3. Locations where this Document May Be Found

The current version of this profile is available at

1.4. Expiration

This document shall remain valid until superseded by a later version.


2. Contact Information

2.1. Name of the Team

Full name: Red Hat Information Security Incident Response Team

Short name: RH-ISIRT

2.2. Address

Red Hat Information Security Incident Response Team
Red Hat, Inc.
100 E. Davie St.
Raleigh, NC 27601
United States

2.3. Time Zone

RH-ISIRT's core office locations and timezones are Brisbane, Australia (AEST UTC +1000), Brno, Czechia (CET, UTC +0100 / CEST, UTC +0200) and Raleigh, NC USA (EST, UTC -0500 / EDT, UTC -0400)

24x7 coverage via emergency contact telephone listed in section 2.4.

2.4. Telephone Number

RH-ISIRT emergency telephone number: +1-919-890-8888

2.5. Facsimile Number

Not applicable.

2.6. Other Telecommunication

Not applicable.

2.7. Electronic Mail Address

Incident reports should be sent to

2.8. Public Keys and Encryption Information

Please encrypt sensitive emails with the RH-ISIRT public key.

PGP Key ID: 0x50EB9D550CFE2855

PGP Fingerprint: A92DF9F915995C7419045F6C50EB9D550CFE2855

Key Available for download:

Please include a public key on all messages, or use a key that can be downloaded and verified from well-known public PGP keyservers

2.9. Team Members

No public information will be disclosed about RH-ISIRT members.

2.10. Other Information

For additional information about Red Hat’s Product Security Team, (distinct from RH-ISIRT), please visit:

RH-ISIRT is listed by the Trusted Introducer (TI) for CERTs in Europe:

RH-ISIRT is a member of Forum of Incident Response and Security Teams (FIRST):

2.11. Points of Customer Contact

The preferred method for contacting RH-ISIRT is email.

For all inquiries please contact

For emergency situations, contact RH-ISIRT at +1-919-890-8888

The RH-ISIRT is generally available Sunday, 23:00 UTC through Friday 1900 UTC, excluding holidays.


3. Charter

3.1. Mission Statement

The Red Hat Information Risk and Security Team (parent organization of RH-ISIRT) ensures Red Hat systems are resilient and secure, that processes are inline with global industry standards and regulations, and are regularly tested.

3.2. Constituency

RH-ISIRT helps safeguard Red Hat Associates, business partners, Red Hat Customers and Red Hat owned businesses. Additionally, RH-ISIRT can act as a liason into many Open Source communities and upstream projects, including but not limited to:,,,, and

3.3. Sponsorship and/or Affiliation

RH-ISIRT is a global team of information security professionals, that serve Red Hat’s corporate functions. This organization reports to Red Hat’s Chief Information Officer, who is a member of Red Hat’s executive management.

3.4. Authority

RH-ISIRT operates under the authority of Red Hat IT, and Red Hat Legal.


4. Policies

4.1. Types of Incidents and Level of Support

All incidents are considered normal priority unless they are labeled "CRITICAL", "URGENT" or "EMERGENCY".

Exercises or communication testing emails should be labeled "EXERCISE" or "TEST".

4.2. Co-operation, Interaction, and Disclosure of Information

All incoming information is handled confidentially by RH-ISIRT.

When reporting a sensitive incident, please indicate so appropriately, using the words "SENSITIVE" or "CONFIDENTIAL" in the subject line, and please consider using encryption as specified in section 2.8.

RH-ISIRT adheres to the Information Sharing Traffic Light Protocol according to the FIRST Standard Definitions and Usage Guidance:

Information tagged with identifiers in the TLP will be handled accordingly.

Red Hat abides by appropriate regional data protection and privacy laws as applicable.

4.3. Communication and Authentication

Please refer to section 2.8. For sensitive information, the use of PGP encryption is strongly advised.


5. Services

5.1. Incident Response

RH-ISIRT can assist system, network, and security operators with the handling of Information Security Incidents, impacting, or originating from Red Hat owned properties.

5.2. Coordination with external Entities

RH-ISIRT participates in external security working communities, regionally, nationally and globally. Examples of this include RH-ISIRT membership in FIRST, team member participation in InfraGard, and other working groups both public and private.


6. Incident Reporting Forms

Not available; please report incidents via email. When reporting issues / incidents to RH-ISIRT, please provide as much of the following information as possible:

Contact details and Org information

Brief Description of the issue or incident

Source and Destination IP Addresses if known

Any relevant logging or evidence which may be available (may be sanitized, if needed)

If forwarding an email to RH-ISIRT for investigation, please ensure that all email headers, message body, and attachment(s) are included.


7. Disclaimers


Red Hat logo LinkedInYouTubeFacebookTwitter


체험, 구매 & 영업


Red Hat 소개

Red Hat은 Linux, 클라우드, 컨테이너, 쿠버네티스 등을 포함한 글로벌 엔터프라이즈 오픈소스 솔루션 공급업체입니다. Red Hat은 코어 데이터센터에서 네트워크 엣지에 이르기까지 다양한 플랫폼과 환경에서 기업의 업무 편의성을 높여 주는 강화된 기능의 솔루션을 제공합니다.

Red Hat Shares 뉴스레터를 구독하세요

지금 신청하기

언어 선택

© 2022 Red Hat, Inc.