Skip to main content

Built for Security Teams, Secured Like One

CaseBender is an on-premise case management platform purpose-built for Security Operations Centers. We understand that the tools security teams rely on must meet the same rigorous standards they enforce across their organizations.

Live Pipeline Status

Every code change to CaseBender passes through automated security gates before it reaches a release. These badges reflect real-time CI/CD status from our build pipeline:
CheckStatusWhat It Covers
Security ScanSecurity ScanGitleaks, Trivy, Semgrep SAST, ESLint Security, OWASP ZAP, dependency review, license compliance, SBOM generation
Supply ChainSupply ChainReproducible build verification, lockfile integrity, dependency pinning, image verification
Image SigningImage SigningCosign keyless signing for all container images, SBOM attestation
SLSA ProvenanceSLSA ProvenanceSLSA Level 2+ build provenance generation and signing
AccessibilityAccessibilityWCAG 2.1 AA, Section 508, ADA Title III compliance
These badges are live and link directly to our CI/CD pipeline. They update automatically with every build.

Security by the Numbers

20 Security Controls

From Zero Trust architecture to DDoS protection, covering SEC-001 through SEC-020

10+ Compliance Frameworks

SOC2, ISO 27001, GDPR, CMMC, FedRAMP, HIPAA, PCI DSS, and more

15+ CI/CD Security Checks

Automated scanning on every commit: SAST, DAST, SCA, secrets, licenses, containers

On-Premise First

Your data never leaves your infrastructure. No telemetry, no cloud dependencies

Signed Artifacts

Every container image is signed with Sigstore. Every build has SLSA provenance

7 Container Images

Each service image is individually scanned, signed, and attested before release

Security Principles

Defense in Depth

CaseBender implements multiple layers of security controls. No single control is relied upon in isolation:
  • Perimeter: Rate limiting, DDoS detection, input validation, SSRF prevention
  • Authentication: MFA (TOTP + WebAuthn/FIDO2), SSO (SAML 2.0), step-up authentication
  • Authorization: RBAC, TLP-based access control, privileged access management
  • Data: Encryption at rest (AES-256) and in transit (TLS 1.3), field-level encryption, data classification
  • Monitoring: UEBA behavioral analytics, insider threat detection, unified audit trail, SIEM forwarding
  • Supply Chain: Signed images, SBOM, SLSA provenance, dependency scanning, reproducible builds

Zero Trust Architecture

Every request is verified regardless of origin. CaseBender implements:
  • Device trust assessment with risk scoring
  • Mutual service authentication (HMAC) between microservices
  • Step-up authentication for sensitive operations
  • Continuous session validation
  • No implicit trust between services

On-Premise Advantage

As an on-premise platform, CaseBender provides inherent security benefits:
  • Data Sovereignty: Customer data stays within your infrastructure boundary
  • Network Control: You control all ingress and egress
  • Air-Gap Support: Deployable in fully isolated environments
  • No Vendor Access: CaseBender has zero access to your running instance or data
  • Compliance Simplification: Your data classification and retention policies apply directly

Explore Security Documentation

Responsible Disclosure

If you discover a security vulnerability in CaseBender, please report it responsibly to security@casebender.com. We take all reports seriously and will respond within 24 hours.