Loading your service...

Service Intake Form

Please complete this form so we can get started immediately.
All information is encrypted and handled under our Privacy & Confidentiality Agreement.

🔐 Your Information Is Safe

We treat your credentials like our own. All information you submit is encrypted in transit (HTTPS), stored only for the duration of your project, and permanently deleted within 7 days of completion. We never share your data with third parties. Read our full Confidentiality Agreement →

👤 Your Information

So we know who we're working with and where to send your completed report.

The domain you want us to audit or fix (e.g. smithlawgroup.com — no "www")

📧 Email Security — DNS Access

To fix your email security records (SPF, DMARC, DKIM), we need access to your DNS settings. We'll make the changes and then you can revoke our access or change the password.

Step 1 — Who manages your DNS?
Step 2 — DNS Login Credentials
🔐 DNS Portal Login

Prefer not to share your password? You can also add david.collins@accisecuritygroup.com as a delegate/collaborator in your DNS portal, then revoke access when done. We'll guide you through it on request.

Step 3 — Email Provider

This helps us generate the correct SPF record for your specific mail server.

🤖 Shadow AI Sweep — Additional Context

No credentials needed for this service — we scan public certificate databases. The questions below help us focus the investigation.

List any AI tools your team officially uses. Anything outside this list is a red flag.

Any other domains or subdomains your company owns.

🔑 Credential Hunt — Context

We search public GitHub repos and breach databases. No access to your accounts needed — we scan only public sources.

If your company has a public GitHub organization, this helps us narrow the search.

We'll specifically search for leaked keys from these services connected to your domain.

☁️ Cloud Data Audit — Access (Optional)

We can find most exposures using public methods. If you'd like us to audit your private buckets too, provide read-only AWS access below — otherwise skip this section.

🔐 Read-Only AWS Credentials (optional)
Create a read-only IAM user with S3 read access only. We'll use it to audit your buckets, then you can delete the user.

Any S3 bucket names you know about so we can audit them directly.

🕵️ OSINT Dossier — Target Information

Tell us about the person or company you need investigated. All research uses publicly available sources only.

💬 Anything Else?

Any specific concerns, urgency, or context that will help us do a better job.

We're on it!

Your intake form has been received. We'll get started immediately and deliver your completed report within 24–48 hours.

You'll receive a confirmation email at the address you provided. If you have any questions before then, reply to that email or contact david.collins@accisecuritygroup.com.