Security and compliance you can verify.
We do not claim a framework as certified until third-party evidence exists. Each status below is explicit so legal, security, and procurement teams can assess risk with confidence.
Framework coverage
Common security and privacy frameworks usually requested in enterprise due diligence.
SOC 2 Type II
In external auditSecurity, availability, and confidentiality controls for the production platform.
Evidence: Control matrix and audit timeline are available during security review.
ISO/IEC 27001:2022
In preparationISMS policy set, risk treatment plan, and control ownership model.
Evidence: Statement of applicability mapping is shared under NDA.
ISO/IEC 27701
PlannedPrivacy information management controls extending the ISMS program.
Evidence: Program roadmap available for enterprise procurement processes.
GDPR
Control-mappedData processing, transfer controls, retention rules, and subject-right workflows.
Evidence: DPA template, SCCs, and subprocessor inventory are available on request.
UK GDPR
Control-mappedUK processing obligations aligned to the same operational control framework.
Evidence: Contractual and operational controls are documented in the privacy pack.
CCPA / CPRA
Control-mappedDisclosure, deletion, and access workflows for California consumer data requests.
Evidence: Data rights process documentation is available during legal review.
NIST CSF 2.0
Control-mappedProgram posture mapped to Govern, Identify, Protect, Detect, Respond, and Recover.
Evidence: Control mapping summary can be provided for security questionnaires.
CSA CAIQ / STAR Level 1
In preparationCloud control questionnaire mapped from the internal security control set.
Evidence: Questionnaire draft is available for strategic customer assessments.
HIPAA
Customer-scope dependentSupportable for scoped use cases with BAA and dedicated implementation review.
Evidence: Risk review and contractual scope are required before handling PHI.
PCI DSS
Customer-scope dependentDesigned to keep payment card data in PCI-certified processors where possible.
Evidence: Architecture boundaries and integration patterns are documented.
LGPD (Brazil)
PlannedCross-border transfer and data rights handling for Brazil-based operations.
Evidence: Legal readiness plan is tracked in the privacy program backlog.
PIPEDA (Canada)
PlannedPrivacy controls for Canadian organizations handling personal information.
Evidence: Scoping package is available for region-specific deployments.
How the program operates
Control operation matters more than checkbox policies. These domains run as recurring operating disciplines.
Access governance
Least-privilege roles, periodic access reviews, enforced MFA, and documented joiner/mover/leaver flows.
Data protection
Encryption in transit and at rest, data minimization patterns, retention schedules, and deletion workflows.
Operational resilience
Documented incident response, change management controls, and tested business continuity procedures.
Vendor assurance
Subprocessor due diligence, contractual controls, and continuous monitoring of critical third-party services.
Need a security review pack?
Send your questionnaire, required frameworks, and procurement timeline. We will share the relevant security and compliance materials.