Security Best Practices - Disclosurely Security
Administrator security guidelines, user security best practices, reporter privacy, password management, device security, and whistleblowing security awareness.
Security Best Practices
Essential security guidelines for administrators, users, and whistleblowers to protect sensitive data and maintain platform security.
Overview
Security is a shared responsibility between Disclosurely, your organization, and individual users. While Disclosurely provides enterprise-grade security infrastructure including encryption, access controls, and monitoring, the effectiveness of these protections depends on proper configuration, user behavior, and organizational policies. This guide provides practical, actionable security best practices for everyone involved in your whistleblowing program.
Following these best practices protects whistleblower identities, prevents unauthorized data access, maintains compliance with regulations like GDPR and the EU Whistleblowing Directive, reduces security incident risk, and builds trust in your reporting system. Security incidents can expose vulnerable whistleblowers to retaliation, create legal liability, and damage your organization's reputation—making proactive security essential.
For Administrators
Initial Setup and Configuration
Secure Platform Configuration:
- Complete initial setup with security as top priority
- Enable multi-factor authentication requirement for all users immediately
- Configure appropriate session timeout settings (2 hours idle recommended)
- Set strong password requirements (minimum 12 characters, complexity required)
- Enable email notifications for security events
- Configure user roles following principle of least privilege
- Review default security settings and tighten as needed
- Document security configuration decisions
User Access Management:
- Assign minimum necessary permissions to each user role
- Use specific roles (Investigator, Reviewer) rather than making everyone Administrator
- Create separate accounts for different functions (no shared accounts)
- Implement temporary access with expiration for contractors
- Require MFA for all administrative accounts without exception
- Review and approve all user access requests formally
- Document justification for elevated access
Learn more about user management in the Team Management documentation.
Ongoing Security Operations
Regular Access Reviews:
- Conduct quarterly access reviews for all users
- Generate access reports from dashboard
- Verify each user's role aligns with current responsibilities
- Remove access immediately when employees change roles or depart
- Check for inactive accounts and disable them
- Audit administrative account usage
- Document review findings for compliance
Security Monitoring:
- Review security monitoring dashboard daily
- Respond promptly to security alerts (same day for high priority)
- Investigate unusual access patterns even if they seem minor
- Monitor failed authentication attempts for brute force indicators
- Review audit logs for suspicious activity
- Track case access patterns for anomalies
- Set up automated alert notifications
Incident Response:
- Establish incident response procedures before incidents occur
- Define escalation paths and contact information
- Test incident response procedures annually
- Document all security incidents thoroughly
- Conduct post-incident reviews and implement improvements
- Report security concerns to security@disclosurely.com immediately
- Maintain incident response documentation for compliance
User Training and Awareness
Security Training Program:
- Provide security training during user onboarding
- Cover password security, MFA setup, and phishing awareness
- Explain importance of protecting whistleblower confidentiality
- Train on recognizing social engineering attempts
- Demonstrate proper handling of sensitive case data
- Conduct annual security awareness refresher training
- Test users with simulated phishing exercises
- Document training completion for compliance
Policy Development:
- Document security policies and procedures
- Define acceptable use policies for platform access
- Establish data handling procedures for case information
- Create device security requirements
- Define incident reporting procedures
- Communicate policies clearly to all users
- Review and update policies annually
- Make policies easily accessible
Compliance and Audit Readiness
Documentation:
- Maintain current security documentation
- Document security control implementations
- Keep records of security training completion
- Preserve security incident reports
- Document access review findings
- Maintain change logs for security configurations
- Prepare compliance reports quarterly
Audit Preparation:
- Understand compliance requirements for your jurisdiction
- Regularly review audit trail functionality
- Test ability to generate compliance reports
- Prepare evidence of security controls
- Document security policies and procedures
- Conduct internal audits before external reviews
- Address audit findings promptly
For All Platform Users
Account Security
Password Management:
- Use strong, unique password (minimum 12 characters)
- Never reuse passwords from other services
- Use password manager to generate and store passwords
- Don't write passwords down or save in unsecured locations
- Enable multi-factor authentication immediately after account creation
- Change password immediately if compromise suspected
- Don't share passwords with anyone, including support staff
Session Security:
- Log out when finished using the platform
- Don't leave platform open on unattended devices
- Use session timeout features (don't disable)
- Review active sessions regularly in security settings
- Terminate unfamiliar sessions immediately
- Don't use "Remember Me" on shared or public computers
- Report suspicious login notifications
MFA Best Practices:
- Set up MFA during first login, don't delay
- Use authenticator app rather than SMS when possible
- Save backup codes in secure location (password manager)
- Don't share MFA codes with anyone
- Keep backup codes separate from primary device
- Update MFA settings promptly when changing devices
- Report lost MFA device to administrator immediately
Data Handling
Accessing Case Information:
- Access only cases assigned to you
- Don't attempt to access restricted or unassigned cases
- Don't share case information with unauthorized colleagues
- Follow need-to-know principle strictly
- Access sensitive cases from secure, private locations
- Don't discuss cases in public areas
- Log evidence downloads with clear business justification
Handling Sensitive Data:
- Download case files only when necessary
- Delete downloaded files after use
- Don't store case data on personal devices
- Don't forward case information via email
- Use secure messaging within platform only
- Encrypt external storage if case data must be stored
- Follow organizational data retention policies
Reporter Identity Protection:
- Never attempt to identify anonymous reporters
- Access reporter identity only when authorized and necessary
- All identity access is logged and reviewed
- Don't share reporter names outside authorized channels
- Protect confidential reporter identities strictly
- Report any inadvertent identity disclosure immediately
Learn more about access controls in the Access Control documentation.
Threat Awareness
Phishing and Social Engineering:
- Be skeptical of unsolicited emails requesting credentials
- Verify sender identity before clicking links or opening attachments
- Don't click login links in emails—navigate directly to platform
- Verify URLs before entering credentials (https://disclosurely.com)
- Don't provide account information over phone unless you initiated call
- Report suspicious emails to your IT security team
- Verify unexpected password reset requests
Physical Security:
- Lock computer when leaving desk unattended
- Don't let others watch you enter passwords
- Use privacy screens when working with sensitive data in public
- Secure printed case documents appropriately
- Shred printed sensitive documents when no longer needed
- Don't leave case files visible on desk
- Report lost devices with platform access immediately
Network Security:
- Use secure, trusted networks to access platform
- Avoid public WiFi when accessing sensitive cases
- Use VPN when accessing from untrusted networks
- Keep devices updated with latest security patches
- Enable device encryption and firewall
- Use up-to-date antivirus software
- Report network security concerns
For Whistleblowers and Reporters
Protecting Your Identity
Anonymous Reporting:
- Use anonymous reporting if you fear retaliation
- Access reporting portal from personal device, not work computer
- Use personal internet connection, not employer's network
- Consider using VPN for additional privacy protection
- Use incognito/private browsing mode
- Clear browser history after submission if using shared device
- Don't include unnecessary identifying information in reports
Tracking ID Security:
- Save tracking ID securely immediately after submission
- Don't share tracking ID with anyone (it's like a password)
- Store tracking ID in secure location (password manager ideal)
- Don't save tracking ID on work devices
- Don't include tracking ID in emails or messages
- Write it down only if stored very securely
- Remember: If lost, anonymous report tracking IDs cannot be recovered
Communication Security:
- Use secure messaging within platform only
- Don't communicate about your report via work email
- Don't discuss report with coworkers, even trusted ones
- Be vague about details that might identify you
- Don't mention your report on social media
- Keep communications about report strictly confidential
- Report any attempts to identify you
Learn more about safe reporting in the How to Submit a Report guide.
Evidence Submission
Preparing Evidence:
- Remove identifying metadata from files before upload
- Check documents for hidden personal information
- Sanitize screenshots to remove identifying details
- Consider what filename might reveal about you
- Remove location data from photos
- Don't include unnecessary personal documents
- Focus evidence on the misconduct, not your identity
Upload Security:
- All files automatically encrypted during upload
- Upload only relevant evidence
- Keep file sizes reasonable (10MB per file limit)
- Don't upload personal identification documents unnecessarily
- Verify HTTPS connection before uploading
- Use trusted device for evidence upload
- Don't upload files from work computer if anonymity important
Maintaining Anonymity
Behavioral Considerations:
- Don't change behavior after reporting
- Don't hint about reporting to colleagues
- Don't ask leading questions about investigations
- Maintain normal work routines
- Be careful about timing of report (not right after incident witnessed)
- Consider what details in report might identify you
- Don't access your report from work network
If Questioned:
- You're not obligated to admit reporting
- Simple denial is acceptable: "I don't know anything about that"
- Don't discuss the report or investigation
- Document any questioning or perceived retaliation
- Report retaliation through the platform immediately
- Consult attorney if threatened or facing retaliation
- Remember: Retaliation is illegal in most jurisdictions
Incident Reporting
When to Report Security Concerns
Report Immediately:
- Suspected unauthorized access to cases or reporter information
- Suspected account compromise (yours or others)
- Unusual login activity or unfamiliar active sessions
- Lost device with platform access
- Inadvertent disclosure of sensitive information
- Phishing attempts targeting platform users
- Suspected insider threat or policy violation
- Any security weakness or vulnerability discovered
How to Report:
- Email: security@disclosurely.com for security issues
- Platform: Dashboard > Support > Security Issue
- Administrator: Contact your organization administrator
- Urgent: Use emergency contact for critical security issues
What to Include:
- Clear description of the security concern
- Date and time the issue occurred or was discovered
- Affected accounts, cases, or data (if known)
- Actions already taken
- Potential impact assessment
- Any evidence (screenshots, logs, etc.)
Response Expectations
Timeline:
- Critical issues acknowledged within 1 hour
- High priority acknowledged within 4 hours
- Standard issues acknowledged within 24 hours
- Regular updates provided until resolution
- Post-incident report for significant issues
Your Role:
- Provide requested information promptly
- Don't investigate further yourself
- Don't discuss issue publicly
- Cooperate with investigation
- Implement recommended remediation actions
- Document lessons learned
Security Awareness Resources
Staying Informed
Security Updates:
- Read platform security notifications
- Stay informed about current threats
- Follow security best practices guidance
- Attend security training sessions
- Review security documentation periodically
- Learn from security incidents (sanitized case studies)
Additional Resources:
- Security Overview - Comprehensive platform security
- Authentication - Login security
- Encryption - Data protection
- Access Control - Permission management
Related Pages
- Security Overview - Complete security architecture
- Multi-Factor Authentication - Enhanced account security
- Authentication - Login and identity verification
- Monitoring - Security operations and alerts
