Skip to main content

Security

Ensealed holds signed legal documents. We treat the bar accordingly.

Encryption

Access controls

Infrastructure

Certifications and frameworks

Reporting a vulnerability

We welcome security research and we will not pursue legal action against researchers who comply with our safe-harbor policy.

Email findings to security@ensealed.com or use the contact at /.well-known/security.txt.

Safe harbor

If you make a good-faith effort to comply with this policy:

Rules of engagement

Rewards

Today we credit valid findings publicly on this page with your consent. We do not run a paid bounty yet. We may pay ad-hoc rewards for impactful findings while we build out a formal program.

Incident response

If we detect or are informed of a security incident affecting customer data, we follow this process:

  1. Detect and triage within 1 hour of internal alert or external report.
  2. Contain the issue, rotate keys, and stop further exposure within 24 hours.
  3. Notify affected customers by email within 72 hours of confirming a personal-data breach, in line with GDPR Article 33 and the strictest US state notification timelines we are subject to.
  4. Notify supervisory authorities (US state AGs, EEA DPAs, UK ICO) as required by jurisdiction. In the US we follow the strictest applicable state law.
  5. Publish a post-incident summary on this page within 30 days of resolution.

For status updates during an active incident, watch this page or follow our status page (linked at the top of the security disclosure form). To report a suspected ongoing incident, email security@ensealed.com with the word URGENT in the subject line.

Acknowledgments

Researchers who have responsibly disclosed will be listed here with their permission.

No findings to publish yet.