LifeVerse is committed to protecting the confidentiality, integrity, and availability of our platform and customer data. This document describes the policies and processes that govern how we secure the product, collaborate with the security community, and respond to potential weaknesses. The policy is intended for enterprise customers, security researchers, and internal stakeholders.
This policy applies to all LifeVerse services, APIs, mobile and web applications, infrastructure, and supporting components managed by the LifeVerse engineering organization. Third-party services are in-scope when they are integrated as part of a LifeVerse offering and operated under LifeVerse configuration.
LifeVerse maintains security coverage for the following release lines:
| Version Line | Support Level | Security Updates | End of Life (EoL) Policy |
|---|---|---|---|
| v1.0.x | General Availability | Critical and high severity fixes, monthly cumulative updates | 12 months after the next GA major release |
| v1.1.x | Early Access / Beta | Best-effort critical fixes | Upgrade to latest GA release within 90 days of GA announcement |
Security updates are delivered through hotfix releases and included in quarterly cumulative releases. Customers should ensure automated deployment pipelines stay current with the latest supported patch version.
We encourage responsible disclosure and welcome collaboration from the security community. To report a vulnerability:
- Do not disclose publicly. Please refrain from creating public GitHub issues, forum posts, or social media notifications.
- Submit a private report to security@lifeverse.com. For sensitive reports you may encrypt your message with our PGP key (
0x7F6D0A1B). - Include detailed information to help us triage effectively:
- Product area, build version, and deployment environment (e.g., SaaS, on-premises, container image).
- Step-by-step reproduction instructions, exploit code (if available), and observed versus expected behavior.
- Potential business impact, data exposure, and any relevant log excerpts or packet captures.
- Suggested mitigations or patches when known.
- Indicate disclosure timelines if you plan to publish your findings so we can coordinate responsibly.
LifeVerse will acknowledge receipt of your report within 24 business hours and will provide a case identifier for future correspondence. Communications are handled by the Security Response Team (SRT).
We follow a structured process aligned with industry standards (ISO/IEC 29147 and 30111):
- Acknowledgment & Initial Assessment (≤24 hours): Confirm receipt, validate scope, and assign severity using CVSS v3.1 scoring.
- Investigation & Remediation Plan (≤5 business days for critical/high findings): Reproduce the issue, assess impact, and determine remediation or compensating controls. For medium/low findings, remediation timelines are defined during release planning.
- Fix Implementation & Verification: Engineering teams implement fixes following secure coding practices, peer review, and automated/static analysis validation. Patches undergo regression testing in staging environments.
- Coordinated Disclosure: Once remediation is available, we coordinate a disclosure timeline with the reporter. Public advisories are published in the repository Security tab and via customer bulletins. Credit is granted with consent.
| Severity (CVSS v3.1) | Target Fix Availability | Deployment Expectation |
|---|---|---|
| Critical (9.0–10.0) | Fix or mitigation within 72 hours | Immediate deployment or emergency change window |
| High (7.0–8.9) | Fix within 10 business days | Deploy in next scheduled maintenance window |
| Medium (4.0–6.9) | Fix in next quarterly release | Deploy per customer change policy |
| Low (0.1–3.9) | Fix as part of roadmap backlog | Deploy with standard release cadence |
If a vulnerability requires customer action, we will provide prescriptive guidance, configuration changes, or temporary mitigations.
LifeVerse will not pursue legal action against security researchers acting in good faith and in accordance with this policy. Activities should avoid privacy violations, service degradation, and data exfiltration beyond what is necessary to demonstrate the vulnerability. If uncertainty arises, contact us before proceeding.
LifeVerse operates a Secure Development Lifecycle (SDL) integrated with our engineering processes:
- Threat Modeling: Product teams perform threat modeling during design reviews, with a focus on authentication, authorization, and data flows.
- Secure Coding Standards: Engineers adhere to secure coding checklists covering input validation, cryptography, dependency management, and OWASP Top 10 categories.
- Automated Security Testing: CI pipelines enforce static application security testing (SAST), software composition analysis (SCA), secret scanning, and infrastructure-as-code policy checks.
- Manual Reviews & Audits: Every change undergoes peer code review. High-risk components receive periodic manual penetration testing by internal or third-party assessors.
- Dependency Governance: Dependencies are managed with automated alerts for known vulnerabilities (e.g., via GitHub Dependabot, Snyk). Critical libraries have defined upgrade playbooks.
- Encryption: Data in transit is protected with TLS 1.2+ and mutual TLS for service-to-service communication. Data at rest is encrypted using AES-256 with centralized key management and key rotation policies.
- Identity & Access Management: Least-privilege access is enforced through role-based access control, multi-factor authentication, and periodic entitlement reviews.
- Monitoring & Logging: Security information and event management (SIEM) captures audit logs, authentication events, and anomaly detection signals. Logs are retained per compliance requirements.
- Incident Response: The Security Incident Response Team (SIRT) operates a 24/7 on-call rotation, performs incident playbook drills quarterly, and communicates with customers per contractual obligations.
- Business Continuity: Disaster recovery plans include geographically distributed backups, quarterly restore testing, and RPO/RTO objectives aligned with enterprise SLAs.
Enterprise customers share responsibility for securing their environments. Customers should:
- Apply security patches within the recommended timelines and monitor vendor advisories.
- Configure LifeVerse according to the Hardening Guide and enforce strong identity practices.
- Ensure integrations and customizations comply with internal security policies and regulatory obligations.
- Report suspected account compromise or data exposure immediately to the SIRT.
Thank you for partnering with LifeVerse to protect our community.