SOC 2 Type IIOWASP Top 10Reviewed May 2026

Web Application Security Program (WASP)

An overview of Pabble's Web Application Security Program — the policies, practices, and controls we follow to keep our application and your data protected.

Overview

Pabble's Web Application Security Program (WASP) defines the standards, processes, and controls we apply to build, deploy, and maintain a secure application. It covers everything from how we write code to how we respond to incidents.

This page is a public summary. A full technical disclosure is available to enterprise customers under NDA.

Diagram showing Pabble's security layers: code, infrastructure, access control, monitoring, and incident response
Security at Pabble is layered — no single control is a single point of failure.

Secure Development Lifecycle

Code Review

Every change to Pabble's codebase requires a peer review before it can be merged. Security-relevant changes (authentication, data access, integrations) require a second review from a senior engineer.

Static Analysis

We run static analysis on every pull request. Any finding rated High or Critical blocks the merge until resolved.

Dependency Management

All third-party dependencies are scanned automatically on each build and on a nightly schedule. We track CVEs against our dependency tree and patch critical vulnerabilities within 48 hours of a fix being available.

OWASP Top 10

Our development practices are aligned with the OWASP Top 10. Engineers are trained on the current OWASP Top 10 during onboarding and annually thereafter. We verify coverage against each category in our quarterly security reviews.

Infrastructure Security

Cloud Provider

Pabble runs on cloud infrastructure within the EU. Our provider maintains ISO 27001, SOC 2 Type II, and PCI DSS certifications. Physical security, hardware maintenance, and network redundancy are managed at the provider level.

Network Segmentation

Production systems are isolated in a separate network segment from staging and development. Inbound access to production is restricted to documented, approved traffic patterns. All other inbound connections are blocked by default.

Secrets Management

Secrets (API keys, database credentials, signing keys) are stored in a dedicated secrets manager — never in environment files, source code, or CI logs. Secrets are rotated on a defined schedule and immediately on any suspected exposure.

Access Control

Least Privilege

Every employee and service account is granted the minimum permissions needed for their role. Access to production data requires a documented business reason, approval from a manager, and MFA.

Privileged Access

Production database access is available to a named set of engineers only and is logged in full. All access sessions are time-limited and audited quarterly.

Offboarding

All access is revoked within 2 hours of an employee departure via an automated offboarding checklist.

Penetration Testing

We conduct an independent penetration test annually with a third-party security firm. Findings are triaged by severity:

| Severity | Remediation SLA | |---|---| | Critical | 24 hours | | High | 7 days | | Medium | 30 days | | Low | Next quarterly release |

Executive summaries from our most recent penetration test are available to enterprise customers under NDA. Contact us to request one.

Vulnerability Disclosure

We operate a responsible disclosure program. If you discover a potential security vulnerability in Pabble, please report it to security@pabble.app before disclosing it publicly. We commit to:

  • Acknowledging your report within 24 hours
  • Providing a status update within 72 hours
  • Notifying you when the vulnerability is resolved

We do not take legal action against researchers who follow responsible disclosure guidelines.

Monitoring and Incident Response

Continuous Monitoring

All production systems emit structured logs to a centralized logging platform. Automated alerts fire on anomalous patterns — failed login spikes, unusual data access, unexpected API call volumes.

Incident Response

We maintain a documented incident response plan with defined roles, escalation paths, and communication templates. In the event of a confirmed breach affecting customer data, we notify affected customers within 24 hours.

Related Pages