Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Current »

Playbooks for security process and operations.

Logs, alerts and incidents.

Security Logs ingestion and review

Security Alerts

Incident Management

Vulnerabilities

Vulnerability Management Process

Bug Bounty / Hackerone

Vulnerability Reports & Disclosure

Pentesting

Internal

External

Projects

Task & Project Management

Code Analysis

Static Code Analysis

Awareness & Training Plan

Server investigation

When contacted about a potentially rogue server, i.e. a server used for criminal purposes, we follow our internal Standard Operating Procedure here.

Law enforcement inquiries are subject to our law enforcement guidelines.

Reporting

On a monthly basis, the security team provides a metric sheet to management and presents in the all-hands meeting. The sheet can be found in GDrive. On a weekly basis, the security team reports the status of the current tasks and issues in the all-hands meeting as per an Clickup export and addition to the newsletter.

  • No labels