Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Logs, alerts and incidents.

Security Logs ingestion and review

Security Alerts

Incident Management

Vulnerabilities

Vulnerability Management Process

Bug Bounty / Hackerone

Vulnerability Reports & Disclosure

Pentesting

Internal

External

Projects

Task & Project Management

Code Analysis

Static Code Analysis

Security Training

Awareness & Training Plan

Server investigation

When contacted about a potentially rogue server, i.e. a server used for criminal purposes, we follow our internal Standard Operating Procedure here.

...