Trust Center - Documentation & Security Controls

Use this section to provide a clear, concise summary of your organisation’s security practices. Sprinto generates an initial overview that you can keep or replace with your own text.

Each time you edit and save the overview, Sprinto creates a new version. You can assign different versions to different Trust Center profiles as needed.


Compliance

List all compliance standards your organisation has achieved or is currently pursuing. This helps customers verify your alignment with recognised global security frameworks.


Trusted By

Showcase key customers who use your products or services. This strengthens trust by demonstrating that reputable organisations rely on your security and controls.


Policies

Policies formalise your organisation’s information security practices. They are a core component of your Trust Center and are often required for security audits.

Sprinto automatically imports relevant security policies from your account. You can also upload additional policies that sit outside Sprinto’s compliance modules.


Documents

Upload any security-related documents that support your Trust Center. These help customers understand your security posture and processes.

Network Diagram

Shows how components in your infrastructure interact. Used for maintenance, security review, and compliance.

Penetration Test Report (Pentest Report)

Provides findings from penetration testing activities. Always upload the most recent report.

Security Whitepaper

A high-level document explaining your security model, threat landscape, and mitigation strategies.

Vulnerability Assessment Report

Lists vulnerabilities identified during a scan, their severity, and recommended remediation steps. Demonstrates diligence in vulnerability management.


Upload or link to documentation required for legal, contractual, or regulatory purposes.

Terms of Service

Defines the agreement between your organisation and its users.

Master Services Agreement (MSA)

Provides the framework that governs all current and future engagements.

Privacy Policy

Explains how customer data is collected, used, stored, and protected.

Business Associate Agreement (BAA)

Required when working with Protected Health Information (PHI) under frameworks such as HIPAA.

Data Processing Agreement (DPA)

Defines the relationship between a data controller and a data processor. Required under several compliance frameworks.


Product Security

Describe the processes and controls used to build and maintain a secure product.

Role-Based Access Control (RBAC)

Assigns permissions based on a user’s role. Example roles include: Administrator, Information Security Officer, and Employee.

Audit Logging

Records user and system activity to support anomaly detection and forensic analysis. Logs are centralised in a SIEM and monitored regularly.


Data Security

Provide an overview of how your organisation safeguards data throughout its lifecycle.

Typical measures include:

  • Annual independent audits

  • Internal risk and privacy assessments

  • Regular penetration testing and vulnerability scanning

  • Encryption of sensitive data at rest and in transit

  • Firewalls with a deny-all default

  • MFA and RBAC for all sensitive systems

  • Centralised logging with alerting

  • Timely patching and updates


Integrations

List the integrations your organisation supports to help users streamline workflows across systems. Examples: Zoho, HubSpot, Salesforce.


Service Level Agreement (SLA)

Explain your service commitments, including availability and responsibilities. Include a link to your SLA if available.


Single Sign-On (SSO)

List all SSO mechanisms your product supports (for example, OAuth and SAML). SSO improves security and simplifies user access.


Team Management

Describe how your product manages internal teams, permissions, and administrative roles.


Data Security — Operational Controls

Explain the operational controls that protect customer data.

Access Monitoring

Describe the systems used to monitor access and enforce least-privilege principles. Examples include AWS GuardDuty, CloudTrail, CloudWatch, and Kibana.

Backups Enabled

Explain your backup frequency, retention, and recovery processes.

Encryption at Rest

Describe encryption standards, such as AES-256, and key management via services like AWS KMS.

Encryption in Transit

Describe encryption protocols used for data transmission, such as HTTPS with TLS/SSL.

Physical Security

Outline the physical protections applied by your cloud provider and your organisation.

Network Security

List the controls used to protect systems from network-based threats.

Data Loss Prevention (DLP)

Protects data from unauthorised exfiltration.

Firewall

Describe the firewall used and how it filters traffic.

IDS/IPS

Detail the intrusion detection and prevention capabilities in place.

Spoofing Protection

Describe email and network spoofing controls, such as SPF, DKIM, and anti-DDoS.

Virtual Private Cloud (VPC)

Explain your hosting architecture, including cloud regions.

Wireless Security

Describe VPN or secure wireless policies.


Application Security

Explain the processes and tools used to ensure secure software development.

Bug Bounty / Responsible Disclosure

Describe your policy for reporting vulnerabilities.

Code Analysis (SAST)

Explain tools and processes used for static code analysis.

Secure Software Development Life Cycle (SDLC)

Describe how secure coding and testing practices are embedded into development workflows.

Credential Management

Explain how secrets are stored and rotated securely (for example, AWS KMS).

Vulnerability and Patch Management

Describe how vulnerabilities are identified, prioritised, and resolved.

Web Application Firewall (WAF)

Explain how your WAF filters and blocks malicious traffic.


Endpoint Security

Outline the controls applied to endpoint devices used by employees.

Disk Encryption

Describe the encryption tools and standards used for employee devices.

Mobile Device Management (MDM)

Explain how devices are provisioned, secured, and remotely managed.

DNS Filtering

Describe tools used to block malicious domains.

Threat Detection

Outline endpoint detection capabilities and threat classification.

Endpoint Detection and Response (EDR)

Explain how devices are monitored continuously for malicious behaviour.


Corporate Security

Describe internal controls, employee responsibilities, and organisational safeguards.

Email Protection

List email protections such as spam filtering, phishing analysis, SPF/DKIM/DMARC.

Employee Training

Describe mandatory security and privacy training requirements.

Incident Response

Outline your incident response framework, including identification, containment, and remediation.

Internal Assessments

Describe periodic risk assessments and their ownership.

Mobile Device Management (Admin)

Explain administrative controls for issuing and managing devices.

Single Sign-On (Internal)

Detail internal SSO requirements for employee access to systems.


Trust Center Updates

Use this section to publish updates on security changes, incidents, remediation actions, or general trust communications. Regular updates demonstrate transparency and strengthen customer trust.

Last updated