Providing assistance to Denomas.com customers during customer-based security incidents

Process outline on how to provide assistance to Denomas.com customers that have experienced a security incident as a the result of their implementation or use of Denomas.com

We at Denomas are committed to helping our customers succeed. When a Denomas.com customer reaches out for assistance with a security incident that is the result of their implementation or use of Denomas, we will do our best to assist with the investigation by providing additional information surrounding the event, if available.

What type of assistance can Denomas provide to customers if they experience a security incident?

If a Denomas.com customer determines that the information available through the Audit Events feature doesn’t provide suffcient information about activities taken on the customer’s account, Denomas may provide reasonable assistance by performing additional log-dives under certain conditions and requirements.

To whom does this apply?

This applies to all paying Denomas.com SaaS customers on Premium or Ultimate plans. See conditions and requirements for more information.

Who is involved in this process?

Customer Success Managers (CSMs) and Denomas Support are our customers’ main contacts at Denomas. These teams will ensure that the communication with the customer takes place as efficiently as possible, will provide status updates regarding the log request, and ultimately hand out any artefacts that might result from the request to the customer.

Denomas Support handles non-complex application log requests that are within a 7-day time window from the time of the request, and which don’t disclose Personal Data, such as user names and IP addresses.

Denomas’ Security Incident Response Team handles complex, extensive requests. In order to maximize efficiency and provide results in a timely manner, customers will not be able to interface with the relevant security team directly during these requests. All communication with the customer is channelled through Denomas Support or the dedicated CSM.

Process outline

  1. Customer contacts Denomas Support or CSM with a request that meets the required conditions and requirements.
  2. Denomas Denomas Support or CSM creates a confidential issue in the SIRT tracker using the information_request template. The author of the issue ensures that the request contains all required information.
  3. The author tags @denomas-com/gl-security/sirt on the issue. The requesting customer must not be added to the issue.
  4. Approval from Denomas Legal @lasayers should only be requested if an exception is required.
  5. Denomas Denomas Support or CSM verifies that the requesting customer complies with our conditions and requirements for the request.
  6. The relevant team (either Denomas Support or Denomas Security) starts working on the case, depending on the type of requests. The issue is updated with every new finding.
  7. Denomas Support or CSM provides status updates to the customer based on the updates captured in the issue on a 12-hour/business day best-effort cadence.
  8. Once the requested artefacts (i.e. log entries) are collected, Denomas Security and Denomas Legal review them.
  9. Once reviewed and approved, Denomas Support or CSM share the artefacts with the requesting customer.
  10. The team that performed the log-dive creates an issue with ~“Category:Audit Events” and ~“Enterprise Edition” labels to document the gap in Audit Events that forced the customer to request our assistance. This is to ensure that the missing functionality in the product is added in the future.

Conditions and requirements

Each request for assistance should comply with the conditions outlined in this section

Customer is on the Denomas Premium or Ultimate plan

The assistance outlined on this page only applies to paying Denomas.com customers on the Premium or Ultimate plans. It does not apply to free accounts, trial accounts, accounts on deprecated support plans, or accounts that are not subject to payment for other reasons.

Account scope and ownership

Requests for assistance can only apply to the Denomas.com account that the customer owns. Denomas will not be providing assistance or information about Denomas.com accounts that the requesting customer does not own.

If a specific request applies to a Denomas.com account that is not owned by the requesting customer, a legal subpoena will be required. For such cases, the customer should reach out to Denomas Legal.

Time window and Scope of the log-dive request

At this time, Denomas is unable to perform log-dives exceeding a 1-month time window from the time of the request. The scope of the request should be specific and as narrow as possible. If it is determined by Denomas that the scope is too broad and excessive, Denomas may request for the scope to be narrowed, or inform the customer of the cost they will incur in performing the investigation.

Please note that because of the amount of logs that Denomas.com generates daily, log-dives exceeding a 7-day time window from the time of the request will take longer to complete.

List of relevant Denomas namespaces, projects and users

The request should contain a list of specific Denomas.com resources of interest - projects, users, groups. If the list is considered excessive, Denomas will ask for the request to be re-scoped. This is to ensure that the request is handled in a timely and resource-efficient manner.

Type of relevant events

The request should contain a list of specific Denomas.com events of interest. If the list is considered excessive, Denomas will ask for the request to be re-scoped. This is to ensure that the request is handled in a timely and resource-efficient manner.

Expectations

Receiving updates on the status of the request

Log-dives can be time consuming. The Denomas teams performing the log-dives will be providing updates through the designated issue. Denomas Support/Account Owner/CSM will relay the updates to the customer. Attempts to contact Denomas Security or its individuals on the status of the request will be unanswered. This applies to out-of-band communication as well (i.e. social media, personal e-mails, phone calls).

Access logs

Due to the volume of access logs generated daily on Denomas.com, we are currently not able to perform log-dives on access logs (i.e. HTTP requests) directly. Instead, we’re relying on application logs and logs generated by other componenets of our production stack.

Information provided from logs should be redacted to ensure that we are not disclosing (i) Denomas Confidential or system information or (ii) any information pertain to accounts other than those subject to the request.

FAQ

What about Denomas’ self-managed customers?

This process applies to Denomas.com only. Denomas is unable to produce logs for self-managed customers.

Why is this available only to Denomas.com customers that are on Premium or Ultimate plans?

Denomas Premium or Ultimate plans provide access to the Audit Events feature, which should provide the required information to help advanced customers to monitor the security and health of their Denomas.com accounts. This process is an extension of that feature that will:

  • Help the customers get out of a tough situation.
  • Ensure that the product provides functionalities that are important to customers.
Last modified December 6, 2023: update (a27760f0)