Legal
Security Policy
How Webb Applications secures RectifAI and how to report a vulnerability.
Security Policy
Effective date: 19 April 2026
Last updated: 19 April 2026
Webb Applications takes security seriously. This policy describes the technical and organisational controls we use to protect RectifAI and your data, and how to report a vulnerability responsibly.
1. Vulnerability disclosure
If you discover a security vulnerability in RectifAI, please report it to us responsibly before public disclosure.
Security contact: security@webbapplications.co.uk
When reporting, please include:
- A description of the vulnerability and its potential impact
- Steps to reproduce the issue
- Any proof-of-concept code or screenshots (if applicable)
We will acknowledge receipt within 48 hours and aim to provide an initial assessment within 5 business days. We will keep you informed of our remediation progress.
We ask that you:
- Do not access or modify customer data
- Do not perform denial-of-service attacks
- Do not publicly disclose the issue until we have released a fix
We will not pursue legal action against researchers who follow these guidelines in good faith.
2. Encryption
Data in transit
- All communication between clients and the Service uses TLS 1.2+
- HTTP requests are automatically redirected to HTTPS at the load balancer
- Database connections use SSL-only mode (ENCRYPTED_ONLY)
- Cloud Pub/Sub messages are transmitted over encrypted channels
Data at rest
- OAuth tokens (access tokens and refresh tokens) are encrypted using AES-256-GCM with a 96-bit IV and 128-bit authentication tag before being written to the database
- Encryption keys are stored in Google Cloud Secret Manager and never hardcoded in application code
- The Cloud SQL database uses SSD storage with Google-managed encryption at rest
- Google Cloud Storage objects (profile images, workspace images) are encrypted using Google's default service account encryption
3. Access controls
- Role-based access control (RBAC) is enforced at the application layer for all workspace resources
- Workspace members can only access data belonging to their own workspace
- All API endpoints require authenticated sessions; unauthenticated requests are rejected
- OAuth integrations use the minimum required scopes for each provider
- Application secrets, database credentials, and API keys are stored exclusively in Google Cloud Secret Manager and injected at runtime; they are never stored in source code or environment files
4. Infrastructure security
- RectifAI runs on Google Cloud Platform (europe-west2, London), which holds ISO/IEC 27001, SOC 2 Type II, and other certifications
- Cloud Run services run as non-root containers in Google's managed execution environment
- Container images are built and stored in Artifact Registry (europe-west2)
- Cloud SQL instances use unix socket connections via Cloud SQL Auth Proxy (no public IP exposure)
- Workload identity is managed via GCP Workload Identity Federation and OIDC tokens; no long-lived service account keys are used in CI/CD
5. Secret management
All credentials, API keys, OAuth client secrets, and signing secrets are:
- Stored in Google Cloud Secret Manager
- Rotated when a team member leaves or a compromise is suspected
- Never logged, printed, or committed to version control
- Audited for presence in source code using Gitleaks on every pull request
6. Dependency management
- Production dependencies are audited using npm audit on every pull request and on a weekly scheduled scan
- Only production dependencies are audited to reduce noise from development tooling
7. Error monitoring and logging
- Errors and performance traces are captured via Sentry (hosted in Germany at de.sentry.io)
- Sentry is configured with text masking enabled and media blocked to reduce PII exposure in error payloads
- Approximately 10–20% of transactions are sampled in production; 1% of sessions are replayed (100% of sessions that encounter an error)
- Application logs may contain incident metadata but are not intentionally populated with user credentials or raw secrets
8. Authentication and session management
- User authentication is handled by NextAuth.js, an open-source library running within the RectifAI application, using Atlassian SSO as the identity provider
- Sessions use secure, HTTP-only cookies managed by NextAuth.js
- An internal HMAC signing secret is used to authenticate requests between the Atlassian Forge app and the RectifAI backend
- All OAuth flows use PKCE where supported
9. Incident response
In the event of a security incident affecting customer data:
- We will investigate and contain the incident as quickly as possible
- We will notify affected workspace administrators within 72 hours of becoming aware of a breach that is likely to result in a risk to individuals' rights and freedoms (as required by UK GDPR Art. 33)
- We will provide a full incident report within 30 days describing the nature of the breach, data affected, and remediation steps
10. Certifications
RectifAI does not currently hold independent certifications (SOC 2, ISO/IEC 27001). We run on Google Cloud Platform, which is itself certified under ISO/IEC 27001, SOC 2 Type II, and PCI DSS.
We are committed to pursuing independent compliance certifications as the product matures.
11. Contact
Security issues: security@webbapplications.co.uk
General privacy: privacy@webbapplications.co.uk
Support: support@webbapplications.co.uk