Security

Security at TrustPoint

Security is key to fulfilling our commitment to our users, and we at TrustPoint take it very seriously. We have certifications, processes, and audits in place to systematically help ensure our product’s safe and secure use for our customers.

Third-party
library scanning
Least-privilege
access controls
Network
segmentation
Two-factor athentication
Spoofing protection
Encryption at rest & transit
Data segregation
AWS
SSO
Secure service authentication
Intrusion detection & prevention
Security awareness training
Information security program
Responsible logic practices
Penetration testing
Infrastructure
as code
Peer reviewed code
Near-real time backup
Continuous vulnerability scan

Security certifications

TrustPoint conducts a variety of audits to ensure continuous compliance with industry standard best practices.

TrustPoint has obtained a SOC 2 Type 2 attestation report by an independent auditor. This objectively certifies our controls to ensure the continuous security of our customers' data.
The SOC 2 audit uses the Trust Services Criteria developed by the Assurance Services Executive Committee (ASEC) of the AICPA. They are used to evaluate the suitability of the design and operating effectiveness ofTrustPoint's controls relevant to the security, availability, or processing integrity of information and systems, or the confidentiality or privacy of the information processed.

Third-party
risk monitoring
Business continuity
Governance, risks & Compliance
Data privacy
Information & Cyber security
Risk management