Trust center

Security and compliance you can verify.

We do not claim a framework as certified until third-party evidence exists. Each status below is explicit so legal, security, and procurement teams can assess risk with confidence.

Evidence-first claims onlyTransparent framework status labelsSecurity documentation available during review

Framework coverage

Common security and privacy frameworks usually requested in enterprise due diligence.

SOC 2 Type II

In external audit

Security, availability, and confidentiality controls for the production platform.

Evidence: Control matrix and audit timeline are available during security review.

ISO/IEC 27001:2022

In preparation

ISMS policy set, risk treatment plan, and control ownership model.

Evidence: Statement of applicability mapping is shared under NDA.

ISO/IEC 27701

Planned

Privacy information management controls extending the ISMS program.

Evidence: Program roadmap available for enterprise procurement processes.

GDPR

Control-mapped

Data processing, transfer controls, retention rules, and subject-right workflows.

Evidence: DPA template, SCCs, and subprocessor inventory are available on request.

UK GDPR

Control-mapped

UK processing obligations aligned to the same operational control framework.

Evidence: Contractual and operational controls are documented in the privacy pack.

CCPA / CPRA

Control-mapped

Disclosure, deletion, and access workflows for California consumer data requests.

Evidence: Data rights process documentation is available during legal review.

NIST CSF 2.0

Control-mapped

Program posture mapped to Govern, Identify, Protect, Detect, Respond, and Recover.

Evidence: Control mapping summary can be provided for security questionnaires.

CSA CAIQ / STAR Level 1

In preparation

Cloud control questionnaire mapped from the internal security control set.

Evidence: Questionnaire draft is available for strategic customer assessments.

HIPAA

Customer-scope dependent

Supportable for scoped use cases with BAA and dedicated implementation review.

Evidence: Risk review and contractual scope are required before handling PHI.

PCI DSS

Customer-scope dependent

Designed to keep payment card data in PCI-certified processors where possible.

Evidence: Architecture boundaries and integration patterns are documented.

LGPD (Brazil)

Planned

Cross-border transfer and data rights handling for Brazil-based operations.

Evidence: Legal readiness plan is tracked in the privacy program backlog.

PIPEDA (Canada)

Planned

Privacy controls for Canadian organizations handling personal information.

Evidence: Scoping package is available for region-specific deployments.

How the program operates

Control operation matters more than checkbox policies. These domains run as recurring operating disciplines.

Access governance

Least-privilege roles, periodic access reviews, enforced MFA, and documented joiner/mover/leaver flows.

Data protection

Encryption in transit and at rest, data minimization patterns, retention schedules, and deletion workflows.

Operational resilience

Documented incident response, change management controls, and tested business continuity procedures.

Vendor assurance

Subprocessor due diligence, contractual controls, and continuous monitoring of critical third-party services.

Need a security review pack?

Send your questionnaire, required frameworks, and procurement timeline. We will share the relevant security and compliance materials.

Request security pack