Vulnerability Disclosure Program

The intended purpose of this web page is for the reporting of security vulnerabilities. Unfortunately, we are not able to assist with account servicing or answer questions about your relationship with Regions Bank via the Vulnerability Disclosure Program submission form or related email address. As such, do not include personal information or sensitive data. To receive assistance with your account or for other questions, please email ContactUs@regions.com or log into your online account and click the “Message Us” option in the bottom right-hand corner of any page.

Security is core to our values, and we value the input of security researchers acting in good faith to help us maintain a high standard for the security and privacy for our customers and associates. This includes encouraging responsible vulnerability research and disclosure. This policy sets out our definition of good faith in the context of finding and reporting vulnerabilities, as well as what you can expect from us in return.

If you believe you have identified a potential security vulnerability, please share it with us by following the submission guidelines below. Thank you in advance for your submission, we appreciate researchers assisting us in our security efforts.

If you suspect fraud on your account, please visit our Report Fraud page.

Expectations

When working with us according to this policy, you can expect us to:

  • Extend Safe Harbor for your vulnerability research that is related to this policy;
  • Work with you to understand and validate your report, including a timely initial response to the submission; and
  • Work to remediate discovered vulnerabilities in a timely manner

Scope

*.firststerling.com
*.regions.com
*.regions.us
*.regions6x.com
*.regionsapps.com
*.regionsdev.com
*.regionsmortgage.com
*.regionsqa.com
*.regionsretirement.com
*.regionssource.com
*.regionstest.com
*.rgbk.com

Any systems not listed above are out-of-scope for security testing under this policy.

Rewards

Regions Bank does not operate a public bug bounty program, however, Regions may at its sole discretion offer a reward or recognition to individuals who are the first to report a unique vulnerability and that report triggers a code or configuration change.

Disclosure Policy

By submitting your vulnerability disclosure to Regions Bank you agree that you will keep information related to the vulnerability confidential and not disclose the vulnerability to any third-party unless Regions Bank has provided you with written authorization to do so. Submission of this vulnerability report provides your permission for Regions Bank to use, create derivatives of, disclose, or modify any information that you have provided.

Official Communication Channels

Vulnerability reports should be submitted using the submission form below. If you are unable to report via this form, you may email us at responsibledisclosure@regions.com.

Please make sure your report contains a detailed description of the discovered vulnerability and steps to reproduce it. We would appreciate if the report would include the following information at minimum:

  • The application, service, product, or system where the vulnerability was discovered
  • Vulnerability class or type
  • Possible security impacts
  • Steps to reproduce the vulnerability
  • Suggested vulnerability mitigation or remediation

Ground Rules

To encourage vulnerability research and to avoid any confusion between good-faith hacking and malicious attack, we ask that you:

  • Play by the rules. This includes following this policy, as well as any other relevant agreements. If there is any inconsistency between this policy and any other relevant terms, the terms of this policy will prevail;
  • Report any vulnerability you've discovered promptly;
  • Avoid violating the privacy of others, disrupting our systems, destroying data, and/or harming user experience;
  • Use only the Official Channels to discuss vulnerability information with us;
  • Keep the details of any discovered vulnerabilities confidential, according to the Disclosure Policy;
  • Perform testing only on in-scope systems, and respect systems and activities which are out-of-scope;
  • Refrain from social engineering (e.g. phishing, vishing), or any other non-technical vulnerability testing
  • If a vulnerability provides unintended access to data: Limit the amount of data you access to the minimum required for effectively demonstrating a Proof of Concept; and cease testing and submit a report immediately if you encounter any user data during testing, such as Personally Identifiable Information (PII), Personal Healthcare Information (PHI), credit card data, or proprietary information;
  • You attest you are not a resident of, or make your Submission from, a country or region against which the United States has issued export sanctions or other trade restrictions (e.g., Cuba, Iran, North Korea, Sudan, Syria and Crimea);
  • You must be at least 18 years old.
  • You should only interact with test accounts you own or with explicit permission from the account holder; and
  • Do not engage in extortion.

Safe Harbor

When conducting vulnerability research according to this policy, we consider this research to be:

  • Authorized in accordance with the Computer Fraud and Abuse Act (CFAA) (and/or similar state laws), and we will not initiate or support legal action against you for accidental, good faith violations of this policy;
  • Exempt from the Digital Millennium Copyright Act (DMCA), and we will not bring a claim against you for circumvention of technology controls;
  • Exempt from restrictions in our Terms & Conditions that would interfere with conducting security research, and we waive those restrictions on a limited basis for work done under this policy; and
  • Lawful, helpful to the overall security of the Internet, and conducted in good faith.

You are expected, as always, to comply with all applicable laws.

If at any time you have concerns or are uncertain whether your security research is consistent with this policy, please submit a report through our Official Channels before going any further.

Submit a Vulnerability