Report an incident or vulnerability
security@denialbase.com
Send a detailed description of what you observed. Include timestamps, affected accounts, and any reproduction steps. PGP key available on request. We acknowledge within 2 business days.
Customer-facing outage or active attack
For anything in progress affecting customer data, mark the email subject with
[URGENT]. On-call engineer paged directly.Severity levels
| Level | Example | Response time | Owner |
|---|---|---|---|
| Sev-1 | Confirmed PHI breach, prolonged platform outage, active attack | 15 min ack / 1 hr response | CTO + Security Officer |
| Sev-2 | Suspected data exposure, degraded service for many customers, authentication subsystem failure | 1 hr ack / 4 hr response | On-call + Security Officer |
| Sev-3 | Single-customer issue, non-PHI data issue, low-severity vuln | Next business day | On-call |
| Sev-4 | Minor bug, cosmetic issue, non-security report | Normal triage queue | Support |
Response phases
Detect
- Automated alerts (Cloud Monitoring) on failed-login spikes, bulk exports, off-hours admin, auth subsystem anomalies.
- External reports via security@denialbase.com.
- Sentry error-rate alerts.
Triage
On-call engineer confirms the signal, assigns severity, and creates an incident record. PHI involvement is a hard triage question at this step.
Contain
- Revoke compromised credentials, disable affected accounts, block abusive IPs at Cloud Armor.
- Isolate affected services (scale down, disable integrations, invalidate sessions).
- Preserve evidence — snapshot databases, capture logs, disable destructive cleanup jobs.
Eradicate & recover
- Identify and patch the root cause.
- Restore affected services to known-good state.
- Rotate any potentially exposed secrets.
Notify
- Covered-entity customers notified per the BAA breach clause within 60 days of discovery, earlier where possible.
- Regulators notified per HIPAA §164.408 if ≥500 individuals affected.
- Status page updated for any customer-visible impact.
HIPAA breach assessment
If PHI may have been affected, we run a §164.402 probability-of-compromise assessment considering:- The nature and extent of the PHI involved.
- The unauthorized person or system who obtained it.
- Whether the PHI was actually acquired or viewed.
- The extent to which risk has been mitigated.
Coordinated disclosure
Security researchers who find and report vulnerabilities responsibly will receive:- Acknowledgement within 2 business days.
- Reasonable coordination on public disclosure timing (typically ≤90 days).
- Credit in our security changelog (with permission).
- At this time we do not pay bug bounties, but we’d like to change that — contact us if you find something serious.
Current limitations — honest status
No formal 24/7 SOC
No formal 24/7 SOC
We have on-call rotation for service outages; for security-specific events we rely on automated alerts routed to the on-call engineer, with escalation to the Security Officer. A dedicated SOC or third-party MDR is on the roadmap once pentest and IRP formalization complete.
No tabletop exercises run yet
No tabletop exercises run yet
IRP tabletop exercises are planned for Q2 2026 immediately after the plan is finalized. Findings will be rolled back into this page.
Pentest not yet contracted
Pentest not yet contracted
First third-party pentest engagement targeted for Q3 2026. See Penetration testing.