Incident Response

Last updated: February 2026

Classification: NDA-scoped reviewer documentation

Response Lifecycle

  1. Detection: identify suspicious activity through monitoring, alerts, or reports.
  2. Containment: isolate affected systems or credentials to limit impact.
  3. Investigation: analyze scope, root cause, and affected data classes.
  4. Remediation: deploy corrective changes and verify recovery.
  5. Review: capture lessons learned and update controls and runbooks.

Communication Approach

  • Customer communication is prioritized when an incident materially affects customer data or availability.
  • Notifications include known impact scope, containment status, and next updates when available.
  • Follow-up communication includes remediation summary and control improvements.

Operational Readiness

  • Incident handling is supported by documented runbooks and operational troubleshooting guides.
  • Backup and recovery procedures are documented for critical data paths.
  • Security and platform maintenance workflows include post-incident corrective actions.

Security Reporting Contact

To report a potential security issue, contact [email protected] and include reproducible details.

Back to Trust Center