Platform ModulesBreach Management
Platform Modules

Breach Management

Incident reporting, configurable intake forms, and breach response workflows

Overview

Neostra's Breach Management module provides a structured approach to handling data breach incidents from initial reporting through resolution. It includes configurable intake forms, incident classification by breach type, and workflow-driven response processes powered by the same workflow engine used for DSAR handling.

Breach Response Workflow

Breach incidents move through configurable workflow stages powered by the same engine used for DSAR management. Each stage can include assigned tasks, approvals, and notifications.

Breach workflows are fully configurable. The stages shown above represent a typical configuration. Your organization can customize stages, transitions, and task assignments to match internal incident response procedures.

Intake Forms

Breach intake forms define the structure for incident reporting. Forms support versioning with a publish lifecycle so you can iterate on form design without affecting active incidents.

Create an Intake Form

Define a new breach intake form with configurable fields.

curl -X POST https://api.neostra.io/v1/breach-intake-forms \
  -H "Authorization: Bearer <token>" \
  -H "Content-Type: application/json" \
  -d '{
    "name": "Standard Breach Report Form",
    "description": "Default intake form for all breach incidents"
  }'

Configure Form Fields

Add fields to the form to capture the information needed for initial triage.

curl -X PUT https://api.neostra.io/v1/breach-intake-forms/{formId}/fields \
  -H "Authorization: Bearer <token>" \
  -H "Content-Type: application/json" \
  -d '{
    "fields": [
      {
        "label": "Incident Date",
        "type": "DATE",
        "required": true
      },
      {
        "label": "Description of Incident",
        "type": "TEXTAREA",
        "required": true
      },
      {
        "label": "Estimated Number of Affected Individuals",
        "type": "NUMBER",
        "required": false
      },
      {
        "label": "Data Categories Involved",
        "type": "MULTI_SELECT",
        "options": ["Personal", "Financial", "Health", "Biometric", "Children"],
        "required": true
      },
      {
        "label": "Breach Type",
        "type": "BREACH_TYPE_SELECT",
        "required": true
      }
    ]
  }'

Publish the Form

Publish the form to make it available for incident reporting.

curl -X POST https://api.neostra.io/v1/breach-intake-forms/{formId}/publish \
  -H "Authorization: Bearer <token>"

Form Versioning

Breach Types

Breach types provide a classification system for categorizing incidents. Configure types to match your organization's incident taxonomy.

curl -X POST https://api.neostra.io/v1/breach-types \
  -H "Authorization: Bearer <token>" \
  -H "Content-Type: application/json" \
  -d '{
    "name": "Unauthorized Access",
    "description": "Unauthorized individual gained access to personal data"
  }'

Breach Incidents

Incidents are created when a breach intake form is submitted and then move through the configured workflow stages.

curl -X POST https://api.neostra.io/v1/breach-incidents \
  -H "Authorization: Bearer <token>" \
  -H "Content-Type: application/json" \
  -d '{
    "formId": "form_001",
    "breachTypeId": "type_unauthorized_access",
    "responses": {
      "incident_date": "2026-03-10",
      "description": "Unauthorized access to customer database detected via anomalous query patterns.",
      "estimated_affected": 1500,
      "data_categories": ["Personal", "Financial"]
    }
  }'

Key API Endpoints

MethodEndpointDescription
POST/breach-intake-formsCreate a new intake form
GET/breach-intake-formsList all intake forms
GET/breach-intake-forms/{id}Get intake form details
PUT/breach-intake-forms/{id}Update an intake form
DELETE/breach-intake-forms/{id}Delete an intake form
POST/breach-intake-forms/{id}/publishPublish an intake form
POST/breach-typesCreate a breach type
GET/breach-typesList all breach types
PUT/breach-types/{id}Update a breach type
DELETE/breach-types/{id}Delete a breach type
POST/breach-incidentsSubmit a new breach incident
GET/breach-incidentsList breach incidents
GET/breach-incidents/{id}Get incident details
POST/breach-incidents/{id}/transitionsAdvance workflow stage

Permissions

ResourcePermissions
Breach Intake Formsbreach-forms:create, breach-forms:view, breach-forms:list, breach-forms:edit, breach-forms:delete
Breach Typesbreach-types:create, breach-types:list, breach-types:edit, breach-types:delete

Deleting a breach type that is referenced by existing incidents will fail. Reassign or close associated incidents before removing a breach type.

Integration with Workflow Engine

Regulatory Notification Timelines

When a breach meets regulatory thresholds, organizations must comply with jurisdiction-specific notification requirements. Neostra automatically calculates applicable timelines based on the geographic scope of the breach.

RegulationAuthority NotificationData Subject NotificationNotes
DPDPA (India)As prescribed by the BoardAs prescribed by the BoardNotify the Data Protection Board of India and affected Data Principals
GDPR (EU)72 hours from awarenessWithout undue delay if high riskNotify the Supervisory Authority; data subjects only if high risk to rights
CCPA/CPRA (US-CA)N/A (no authority notification)"In the most expedient time possible"Notification required if unencrypted personal information is breached

Regulatory timelines start from the moment the organization becomes aware of the breach, not from the date the breach occurred. Accurate recording of the "Date Discovered" field in the intake form is critical for compliance.

Severity Scoring

Neostra uses a severity scoring mechanism to classify breach incidents and determine appropriate response timelines. Scores are generated based on the category of personal data involved in the breach.

Severity LevelScore RangeSLA: Initial AssessmentSLA: Escalation to DP LeadExample Data Categories
Critical90-1004 hoursImmediateBiometric, children's data, financial credentials
High70-8912 hours24 hoursHealth records, government IDs (Aadhaar, PAN, SSN)
Medium40-6924 hours48 hoursContact details, purchase history, employment data
Low0-3948 hours5 business daysPublicly available information, anonymized datasets

Stakeholder Notification

When a breach is created, Neostra automatically identifies required stakeholders and generates notification tasks within the breach workflow.

Identify Applicable Jurisdictions

Based on the geographic location of affected data subjects, Neostra determines which regulatory frameworks apply (DPDPA, GDPR, CCPA, etc.).

Generate Notification Tasks

The system creates notification tasks for each required stakeholder: the Data Protection Board (DPDPA), Supervisory Authority (GDPR), affected Data Subjects, and the organization's Data Fiduciary / Executive Sponsor.

Send Notifications

Notification tasks include pre-configured email templates with the required regulatory information. Templates are customizable per regulation and include: breach description, data categories involved, estimated number of affected individuals, measures taken, and contact details for the Grievance Officer or DPO.

Track Acknowledgement

All notifications are tracked with delivery status, acknowledgement timestamps, and any responses received.

Breach Terminology Reference