|

Trust Centre

Welcome to our Trust Centre, a centralised hub for showcasing our commitment to security, privacy, and compliance. Here, you’ll find transparent and up-to-date information about our security practices, compliance certifications, and data protection policies.

Request Access

Compliance

ISO 27001
ISO 27001:2022 *
GDPR Compliant
GDPR
HIPAA Compliant
HIPAA
CCPA Compliant
CCPA
AU Privacy Act
AU Privacy Act
UK DPA 2018
UK DPA 2018
NIST CSF
NIST CSF
ASD Essential Eight
Essential Eight
OWASP Top 10
OWASP Top 10
Cyber Essentials UK
Cyber Essentials
EU AI Act
EU AI Act
NIS2 Directive
NIS2 Directive

* Certification in progress

Controls

Product Security (7 Controls)
  • Secure Software Development Lifecycle established
  • Penetration Testing conducted
  • Change Management procedures enforced
  • Vulnerability scanning procedures established
Access Management (9 Controls)
  • Role Based Access Control (RBAC) established
  • Multi-Factor Authentication implemented
  • User Access Reviews conducted
  • Password policy enforced
Security & Continuity (7 Controls)
  • Business Continuity and DR plans established
  • Continuity and DR plans tested
  • Incident Response plan tested
  • Data backups and restoration procedures tested
Data Security (4 Controls)
  • Encryption at rest implemented
  • Encryption in transit implemented
  • Encryption key management process established
  • Network and firewall access restricted
Organisation Security (9 Controls)
  • Risk Assessment and treatment established
  • Vendor Risk Management established
  • Asset Management maintained
  • Security Awareness Training implemented
Endpoint Security (4 Controls)
  • Endpoint Detection and Response established
  • Disk encryption enforced
  • Threat and Malware protection enforced
  • Endpoint Management policies established

Policies

Disaster Recovery Plan
Roles and Responsibility Policy
Application Security Policy
Asset Management Policy

Subprocessors

Aikido
Application security and vulnerability management
Auth0
Identity and Access Management (IAM)
AWS
Cloud service provider
Azure
Cloud service provider
Deepgram
AI-powered automatic speech recognition (ASR)
GitHub
Source code management and CI/CD

Product Security

(7 Controls)
Secure Software Development Lifecycle established

The company follows a Secure Software Development Lifecycle (SDLC), embedding security from initial design through deployment and maintenance.

Penetration Testing conducted

The company performs annual third-party penetration tests to simulate cyber attacks and uncover system vulnerabilities.

Change Management procedures enforced

All software and infrastructure modifications undergo formal review and approval before deployment to production environments.

Vulnerability scanning procedures established

Comprehensive vulnerability scanning procedures assess the security posture of all systems on a regular basis.

Secure product architecture defined

A documented secure product architecture defines the structure and components of the platform with security at every layer.

Production environment segregation enforced

Production environments are separated from development and staging to prevent unauthorised access and data leakage.

Intrusion Detection systems utilised

Intrusion detection systems continuously monitor network activity to identify and respond to suspicious behaviour.

Access Management

(9 Controls)
Role Based Access Control (RBAC) established

RBAC is enforced via a central identity provider, ensuring system access aligns strictly with job responsibilities.

Multi-Factor Authentication implemented

MFA is required for all sensitive access, including production systems, administrative consoles, and cloud services.

User Access Reviews conducted

Scheduled user access reviews are conducted on production systems, databases, and applications to ensure appropriate access levels.

Password policy enforced

A comprehensive password policy defines required password strength and complexity across all systems.

Restricted production access maintained

Only authorised users have access to the production environment, with access strictly controlled and monitored.

Privilege access restricted

Privileged access to critical systems is granted only to authorised personnel following the principle of least privilege.

Access control policies and procedures defined

Documented access control policies outline how user access is provisioned, reviewed, and revoked across all systems.

Production database access restricted

Access to production databases is restricted to authorised personnel only, with production data protected from unauthorised access.

Access request and approval process defined

A formal access request and approval process ensures access is granted based on job requirements with appropriate authorisation.

Security & Continuity Procedures

(7 Controls)
Business Continuity and Disaster Recovery plans established

BCP and DR plans secure operational resilience amid disruptions, with documented procedures for all critical systems.

Continuity and Disaster Recovery plans tested

BC/DR plans are validated with annual testing to ensure effectiveness and identify areas for improvement.

Incident Response plan tested

The Incident Response Plan is tested at least annually through tabletop exercises or similar simulations.

Data backups and restoration procedures tested

Regular backups of production data are performed, stored separately from production, and tested for restoration reliability.

Production multi-availability zones utilised

Multiple availability zones ensure redundancy and high availability across the production environment.

Production monitoring implemented

Comprehensive monitoring across the production environment tracks system performance, availability, and security events.

Audit logging established

Audit logging records key events across application and infrastructure layers for security analysis and compliance reporting.

Data Security

(4 Controls)
Encryption at rest implemented

Data at rest is secured using industry-accepted encryption standards such as AES-256 across all storage systems.

Encryption in transit implemented

All data in transit is encrypted using TLS 1.2 or newer, with no support for deprecated cryptographic protocols.

Encryption key management process established

Encryption key management restricts access to authorised personnel with defined rotation and storage procedures.

Network and firewall access restricted

Firewalls are configured to limit unnecessary ports and protocols, with network segmentation enforced across environments.

Organisation Security

(9 Controls)
Risk Assessment and treatment established

An annual company-wide risk assessment and quarterly follow-ups identify, evaluate, and treat security risks.

Vendor Risk Management established

All new vendors are assessed according to the Vendor Risk Management Policy before engagement and on an ongoing basis.

Asset Management maintained

An inventory of physical and virtual assets is maintained, governed by a Configuration and Asset Management Policy.

Security Awareness Training implemented

A Security Awareness Training programme covers key information security topics for all employees on a regular basis.

Secure Development Lifecycle (SDLC) Training implemented

SDLC training is conducted for all software engineers, covering secure coding practices and vulnerability awareness.

Defined roles and responsibilities established

Roles and responsibilities for information security, availability, and confidentiality are clearly documented and assigned.

Service Level Agreement established

A Service Level Agreement committing to 99.9% service availability is maintained with defined monitoring and reporting.

Candidates screening checks

Screening checks for new hires and internal transfers verify qualifications, references, and background suitability.

Confidentiality agreement acknowledged by employees

All employees acknowledge and sign a confidentiality agreement during onboarding, with annual reaffirmation.

Endpoint Security

(4 Controls)
Endpoint Detection and Response established

EDR continuously monitors and responds to threats on all endpoints, providing real-time visibility into security events.

Disk encryption enforced

Disk encryption is enforced on all organisational devices to protect sensitive data from physical compromise.

Threat and Malware protection enforced

Advanced threat and malware protection is enforced across all systems using industry-leading security tools.

Endpoint Management policies established

Endpoint Management policies enforce strong passwords, anti-virus protection, and automatic updates on all devices.

Aikido
Application security and vulnerability management
Auth0
Identity and Access Management (IAM)
AWS
Cloud service provider
Azure
Cloud service provider
Confluence
Workspace productivity and collaboration
Deepgram
AI-powered automatic speech recognition (ASR)
GitHub
Source code management and CI/CD
Google Workspace
Workspace productivity and collaboration
HubSpot
Inbound marketing, sales, and customer service
HubSpot Content Hub
Marketing productivity and automation
Jira Software
Workspace productivity and collaboration
Microsoft Entra
Identity and Access Management (IAM)
Office 365
Workspace productivity and collaboration
Reset Data
Data privacy and compliance automation
Slack
Workspace productivity and collaboration
Disaster Recovery Plan
Roles and Responsibility Policy
Application Security Policy
Asset Management Policy
Human Resources Policy and Procedure
Access Control Policy
Change Management Policy and Procedure
Communication Policy
Internal Audit Report
Information Security Policy
Data Classification
Code of Business Conduct and Ethics
Encryption Key Management Policy
Risk Assessment and Treatment Policy and Procedure
Incident Management Policy and Procedure
SDLC Policy
Audit Logging and Monitoring Policy
Mobile Device Policy
Service Level Addendum
Third Party Risk Management Policy
Acceptable Use Policy For Contractors
Security Awareness and Training Policy
Backup Policy
Policy Creation and Document Control Procedure
System and Network Management Policy
Vulnerability and Threat Management Policy and Procedure
Record Retention Policy
Internal Audit Policy
Password Policy
Data Breach Policy