Skip to main content

Role-Based Access Control (RBAC)

CaseBender implements granular RBAC that controls access at every level of the platform.

Role Hierarchy

RoleScopeCapabilities
Super AdminPlatform-wideFull platform configuration, user management, security settings, all data access
Org AdminOrganizationOrganization settings, team management, integration configuration, all org data
Team LeadTeamTeam case assignment, workload management, team-level reporting
AnalystAssigned workCase/alert investigation, task completion, comment and observable management
Read-OnlyAssigned scopeView cases, alerts, and dashboards without modification capability
IntegrationAPI scopeProgrammatic access scoped to specific API operations and data types

Permission Granularity

Permissions are defined at the resource and action level:
  • Entity Permissions: Create, read, update, delete for cases, alerts, tasks, observables, comments
  • Administrative Permissions: User management, team management, organization settings
  • Security Permissions: RBAC configuration, audit log access, security settings
  • Integration Permissions: API key management, webhook configuration, external tool settings
  • Compliance Permissions: Retention policy management, legal hold, evidence collection

TLP-Based Access Control

In addition to RBAC, the Traffic Light Protocol restricts data visibility:
  • Users can only access entities at or below their maximum TLP clearance level
  • TLP restrictions are enforced at the database query level (not just UI)
  • TLP access checks are logged in the audit trail
  • TLP violations generate security alerts

Privileged Access Management (PAM)

CaseBender implements just-in-time privilege elevation for sensitive operations, ensuring no user has standing privileged access.

How PAM Works

  1. Request: User requests elevated privileges for a specific operation
  2. Justification: User provides a business justification for the elevation
  3. Approval: Request is routed to an approver (configurable per operation type)
  4. Time-Bound Grant: Privileges are granted for a limited duration (default: 1 hour)
  5. Audit: All actions performed during the elevated session are logged with the elevation context
  6. Auto-Revoke: Privileges are automatically revoked when the time window expires

Privileged Operations

OperationDefault DurationApproval Required
Bulk data deletion30 minutesYes
Security configuration changes1 hourYes
User role elevation1 hourYes
Audit log export30 minutesNo (logged)
Integration credential access15 minutesYes
Data retention policy changes1 hourYes

PAM Security Features

  • No Standing Privileges: Elevated access is always temporary
  • Anomaly Detection: Unusual elevation patterns trigger security alerts
  • Session Recording: All actions during elevated sessions are captured in detail
  • Dual Approval: Critical operations can require approval from two separate approvers
  • Emergency Access: Break-glass procedures for critical incidents with enhanced audit logging

Cross-Team Case Visibility

CaseBender supports controlled sharing of cases across team boundaries without compromising data isolation.

Access Grant Types

Grant TypeDescriptionUse Case
DirectSpecific user granted access to a specific caseCross-functional investigation
TeamEntire team granted access to a caseEscalation to specialized team
OrganizationAll users in an organization can view the caseMajor incident with broad impact
TemporaryTime-limited access that auto-expiresExternal consultant review

Access Levels

  • View: Read case details, alerts, tasks, and timeline
  • Comment: View access plus ability to add comments and notes
  • Contribute: Comment access plus ability to add observables, tasks, and evidence
  • Full: Complete access including status changes and case management

API Security

API Key Management

  • Scoped Keys: Each API key is restricted to specific operations (read-only, write, admin)
  • Tier-Based Limits: Standard, Professional, and Enterprise tiers with different rate limits
  • Key Rotation: API keys can be rotated without downtime (grace period for old key)
  • Expiration: Optional expiration dates for temporary integrations
  • Usage Tracking: Per-key usage statistics and anomaly detection

Rate Limiting

TierRequests/MinuteBurst LimitConcurrent
Standard601005
Professional30050020
Enterprise1,0002,00050
Rate limit headers are included in every API response:
X-RateLimit-Limit: 300
X-RateLimit-Remaining: 287
X-RateLimit-Reset: 1706745600

Webhook Security

  • HMAC Signatures: Every webhook delivery is signed with HMAC-SHA256
  • Signature Verification: Recipients can verify the signature to ensure authenticity
  • Retry Logic: Failed deliveries are retried with exponential backoff
  • Delivery Logs: Full delivery history with request/response details
  • IP Allowlisting: Optional restriction of webhook destinations to approved IP ranges

Input Validation

All API inputs are validated before processing:
  • Schema Validation: Zod schemas enforce type safety on every endpoint
  • HTML Sanitization: User-provided HTML is sanitized to prevent XSS
  • SQL Injection Prevention: Parameterized queries via Prisma ORM (no raw SQL)
  • SSRF Prevention: External URL validation blocks private IP ranges and internal hostnames
  • File Upload Validation: MIME type verification, extension blocking, size limits