Incident Response
Effective: March 31, 2026 ยท To report a security issue: security@fluxcybers.polsia.app
Our Methodology
FluxCybers ExecFlow's incident response follows the same Detect โ Respond โ Prove pipeline that powers our Sentry V AI product. We apply our own methodology to our own infrastructure first. Every significant incident generates an immutable audit trail entry โ the same cryptographic proof we sell to enterprise customers.
Severity Classification
| Severity | Definition | Response Time | Customer Communication |
|---|---|---|---|
๐ด P1 โ Critical |
Full platform outage, data breach, or data loss affecting multiple customers | 15 min | Status page update + email blast to all active users + in-app banner |
๐ P2 โ High |
Major feature unavailable, partial data loss, or security vulnerability actively being exploited | 1 hour | Status page update + email to affected customers |
๐ก P3 โ Medium |
Degraded performance, non-critical feature down, elevated error rates | 4 hours | Status page update only |
โช P4 โ Low |
Minor bug, cosmetic issue, isolated user problem | 24โ48 hours | Release notes or individual response |
Customer Communication Protocol
FluxCybers ExecFlow commits to proactively communicating during incidents. You will never have to ask "is something wrong?" โ we post updates before customers notice.
Post-Incident Reviews
For P1 and P2 incidents, FluxCybers ExecFlow publishes a post-incident review (root cause analysis) within 72 hours of resolution. The review includes:
- Timeline of events (detection โ response โ resolution)
- Root cause and contributing factors
- Impact scope (services affected, customers affected, duration)
- Remediation actions taken
- Preventive measures being implemented
Post-mortems are published to the incident history on status.fluxcybers.polsia.app. Blameless culture: the goal is system improvement, not individual accountability.
Security Vulnerability Reporting
๐ Responsible Disclosure
If you discover a security vulnerability in FluxCybers ExecFlow, please report it privately before disclosing publicly. Email security@fluxcybers.polsia.app with a description of the vulnerability, reproduction steps, and your contact information.
We will acknowledge receipt within 24 hours, investigate within 7 days, and coordinate a disclosure timeline with you. We ask for a minimum 90-day embargo before public disclosure to allow time to fix and deploy a patch. Bug bounty rewards are available for valid critical findings.
Compliance Alignment
FluxCybers ExecFlow's incident response program is designed to align with the following frameworks. We use these frameworks as guides for process design, not as marketing claims โ we will specify certification status when obtained.
Our immutable audit trail (powered by Sentry V AI) provides the evidence collection required by all three frameworks for incident management controls.
SLA Impact
Incidents that cause downtime are tracked against SLA commitments. View your plan's uptime guarantees and credit policy in the SLA document. Enterprise customers receive cryptographically verified uptime proof for any dispute โ the audit trail IS the evidence.