Org Logo

Compliances (3)

Compliance Logo

SOC 2

In progress

Compliance Logo

ISO 27001

In progress

Compliance Logo

GDPR

In progress

Controls

Continuously monitored

Product security (2)

Production System User Review

Situational Awareness For Incidents

Data security (13)

Identity Validation

Termination of Employment

Production Databases Access Restriction

Network security (8)

Impact analysis

Limit Network Connections

External System Connections

App security (4)

Conspicuous Link To Privacy Notice

Secure system modification

Approval of Changes

Endpoint security (5)

Malicious Code Protection (Anti-Malware)

Full Device or Container-based Encryption

Endpoint Security Validation

Corporate security (34)

Code of Business Conduct

Organizational Structure

Roles & Responsibilities

Resources (42)

Business Continuity & Disaster Recovery Policy

Asset Management Procedure

HR Security Policy

Subprocessors (5)

Subprocessor Logo

AWS

United Kingdom

IT infrastructure

Subprocessor Logo

GitHub

United Kingdom

Development software

Subprocessor Logo

Github Dependabot

United Kingdom

Development software

Subprocessor Logo

Google Workspace

United Kingdom

IAM providers

Subprocessor Logo

Firebase

United Kingdom

Analytics

Building trust, made easy by

Sprinto Logo

Create your own trust center in 2 mins