GH GambleHub

Incident and leak response

1) Purpose, principles and scope

The goal: to reduce damage and legal risks, ensure the continuity of operations and the provability of actions in case of security/compliance incidents.

Principles: "quickly contain → accurately confirm → transparently document → lawfully notify → prevent repetition."

Coverage: cyber incidents (DDoS, ATO, hacks, vulnerabilities), PII/payment data leaks, AML/KYC/sanctions violations, provider failures (KYC/PSP), advertising/responsible gaming (RG) incidents, compromised partners.


2) Severity classification and triggers

LevelDescriptionExamples of triggersMandatory actions
InfoSignal/anomaly without confirmation1-2 ATO alert, single CVE mediumLogging, observation
LowLocal failure without PII/moneySlight KYC degradation, brief PSP timeoutsTicket to the owner, fix per shift
MediumSegment/Jurisdiction RiskCBR ↑ to threshold, confirmed ATO clusterEscalation ≤4 h, setting rules/patch
HighSignificant business impactLimited PII leak, KYC vendor failureIncident bridge ≤1 h, containment
CriticalMass Damage/RegulatoryMass leak PII, DDoS with inaccessibility, sans. violationWar-room ≤15 minutes, notifications and public plan

3) SLA escalations and "incident-bridge"

Initiation: High/Critical creates a war-room (chat/call), assigns an Incident Commander (IC).

SLA: Info — n/a; Low - 24 h; Medium — 4 ч; High - 1 h; Critical - 15 min

Bridge roles: IC, Security Lead, SRE/Ops, Compliance (Deputy IC for Legality), Legal/DPO, Payments/FRM, Support/VIP, PR/Comms, Data/Forensics.


4) Response process (SANS/NIST stack in adaptation)

1. Preparation: runbooks, contact lists, backup providers, test alerts, "default closed" accesses.
2. Identification: SIEM/SOAR correlations, anti-fraud rules, KRI signals; fact/volume confirmation.
3. Containment: segmentation, disabling vulnerable feature/endpoint, geo-constraints, feature-flags, time limits/holds.
4. Elimination (Eradication): patch/key rotation, block of accounts/devices, cleaning of malicious artifacts, reassembly of images.
5. Recovery: integrity validation, gradual inclusion of traffic (canary pools), regression monitoring.
6. Post-Incident: post-mortem ≤72 h, CAPA plan, update policies/thresholds/models.


5) Legal notices and external communications

💡 Time windows and destinations vary by jurisdiction/license; focus on local requirements and contracts. A frequent data protection benchmark is to notify the regulatory authority within 72 hours of a significant leak being identified; notifying users - "without undue delay" at risk to their rights/interests.
Destination matrix and reasons (example):
  • Data surveillance (DPA): confirmed PII leak → notification (incident description, data categories, measures, DPO contact).
  • Gambling regulator: Massive violations of RG/advertising rules/failures affecting players/reporting.
  • Banks/PSP: suspicious activity/SAR cases, massive chargebacks, compromise of payment flow.
  • Users: leakage of their data/high risk of harm; letter templates and FAQs.
  • Partners/vendors: incidents with them or with us affecting common flows/data.

Comm rules: a single speaker, facts without guesswork, clear actions/recommendations, store all versions of messages and answers.


6) Forensics and the "chain of custody" (Chain of Custody)

Record who/when/what collected; use WORM/non-modifiable storage.
Volume/log snapshots, exporting artifacts via hashing (SHA-256).
Read-only accesses, working through duplicates.
Document all commands/steps; store the timeline.
Agree with Legal/DPO on the conditions for transferring artifacts to third parties.


7) Controlled communications (internal/external)

Do: concise, factual, agreed with IC/Legal; Specify the next update slot (e.g. every 60 minutes).
Don't: hypotheses as facts, PII disclosures, allegations, promises of deadlines unchecked.

Internal update template (every 30-60 minutes):
  • What happened ?/Severity/Area of influence/Measures taken/Next steps/Next update in...

8) Typical domain playbook 'and

A) PII leak (application/backend/vendor)

1. Bridge ≤15 min → freeze suspicious end-points/keys → enable increased auditing of data access.
2. Rate: determine the source/volume/types of PII, time line.
3. Actions: rotation of secrets, fixes, revision of rights, isolation of the vendor.
4. Notifications: DPA/regulator/users/partners (as required).
5. Player support: FAQ, support channel, recommendations (password change/fraud).
6. Post-mortem and CAPA.

B) Compromise of player accounts (ATO/credential stuffing)

1. Spike in ATO signals → amplify rate limit/2FA-enforce/WebAuthn, temporary output blocks.
2. Clustering of devices/IP, sending notifications to those affected, resetting tokens.
3. Check financial transactions, SAR if necessary.

C) Refusal of CUS/sanction provider

1. Switch to fallback provider, limit fast outputs, manual flow for VIP.
2. Comm for support and VIP managers; during tightening - informing the regulator/banks (if it affects the checks).

D) PSP/payment incident (chargebacks/compromise)

1. Enable strict 3DS/AVS, drop limits and velocity rules; hold risk groups.
2. Inform PSP/bank; with signs of laundering - EDD/SAR.
3. Recover and audit rejected traffic.

E) DDoS/unavailability

1. Activate WAF/geo-cutting/scrubbing; "frost" releases.
2. Canary inclusion of regions, SLO control; post-mortem on resilience.


9) Tools and artifacts

SIEM/SOAR, IDS/IPS, WAF, EDR, DLP, secret manager, vault rotations, anti-fraud anomaly detection, incident register, notification templates.
Artifacts: incident register, bridge protocol (timeline), forensics report, notification package (regulator/users/banks), post-mortem, CAPA tracker.


10) Metrics and targets

MTTD (time to detection), MTTC (before containment), MTTR (before recovery).
% of incidents with established root cause ≥ 90%.
CAPA completion rate ≥ 95%.
The proportion of repeated incidents for the same reason ≤ 5%.
The proportion of incidents closed in SLA: Medium ≥ 90%, High ≥ 95%, Critical ≥ 99%.


11) RACI (enlarged)

Incident Commander (Ops/Sec): A for management, decision making, timeline.
Security Lead (R): tech. analysis, forensics, containment/eradication.
Compliance/DPO (R/A for legality): leak qualification, notifications, mailing list.
Legal (C): legal evaluation, contracts/contracts, wording of letters.
SRE/Engineering (R): fixes, pullbacks, stability.
Payments/FRM (R): holds, anti-fraud threshold, interaction with PSP/banks.
PR/Comms (R): external messages, Q&A for support.
Support/VIP (I/C): front of communication with players.


12) Templates (minimum set)

12. 1 Incident card (register)

ID· Time of discovery· Class/severity· Affected (systems/data/jurisdictions)· IC· Owner of tech/business· First measures· Volume/damage assessment· Notifications (to/when)· Links to artifacts· Status/CAPA/deadlines.

12. 2 Notification to users (squeeze)

What happened; what data may have been affected; what we did; what we recommend to you; contact information; policy reference/FAQ.

12. 3 Post-mortem (structure)

Facts/Timeline· Impact· Root Cause (5 Whys)· What worked/didn't work· CAPA (owner/deadline)· Effectiveness check after N weeks.


13) Integration with operations and compliance

CAB/Change: dangerous changes - only through feature flags/canaries; each release has a rollback plan.
Data and reporting: automatic assembly of dashboards of incidents; communication with KRIs (sanctions/PEP, KYC, CBR, ATO).
Risks: update of the risk matrix and register, calibration of thresholds after each major incident.


14) Exercises and readiness

Tabletop once a quarter (PII leak, KYC failure, ATO wave, PSP incident).
Red/Blue/Purple-team checks; joint exercises with vendors and PSP.
Readiness KPI: percentage of employees who completed the training; the success of the exercise; average "bridge lift" time.


15) Implementation Roadmap

1-2 weeks: updating roles/contacts, templates, backup providers.
3-4 weeks: SOAR playbooks, bridge channels, test notifications, WORM archive.
Month 2 +: regular exercises, audit logs, automation of incident reporting.


TL; DR

Readiness = pre-agreed roles and thresholds + fast bridge + hard containment + legal and timely notifications + forensics with chain of evidence + mandatory post mortems and CAPAs. This minimizes damage, reduces penalty risks and strengthens the confidence of players and partners.

Contact

Get in Touch

Reach out with any questions or support needs.We are always ready to help!

Start Integration

Email is required. Telegram or WhatsApp — optional.

Your Name optional
Email optional
Subject optional
Message optional
Telegram optional
@
If you include Telegram — we will reply there as well, in addition to Email.
WhatsApp optional
Format: +country code and number (e.g., +380XXXXXXXXX).

By clicking this button, you agree to data processing.