How we detect, contain, and communicate security incidents — and the SLAs we hold.
Severity tiers, SLAs, and how we communicate incidents to customers.
How security researchers can report vulnerabilities and what they can expect from us.