Security

At TrustPoint security is key to fulfilling our customer commitment.

We take security very seriously. Regular certifications, processes, and audits help us systematically ensure our products remain safe and secure for users.

Third-party library scanning
Least-privilege access controls
Network segmentation
Two-factor athentication
Spoofing protection
Encryption at rest & transit
Data segregation
AWS
SSO
Secure service authentication
Intrusion detection & prevention
Security awareness training
Information security program
Responsible logic practices
Penetration testing
Infrastructure as code
Peer reviewed code
Near-real time backup
Continuous vulnerability scan

Audited  
Security
Certifications

TrustPoint conducts a variety of audits to ensure continuous compliance with industry standard best practices.

TrustPoint has obtained a SOC 2 Type 2 attestation report by an independent auditor. This objectively certifies our controls to ensure the continuous security of our customers' data.

The SOC 2 audit uses the Trust Services Criteria developed by the Assurance Services Executive Committee (ASEC) of the AICPA. They are used to evaluate the suitability of the design and operating effectiveness ofTrustPoint's controls relevant to the security, availability, or processing integrity of information and systems, or the confidentiality or privacy of the information processed.
Third-party
risk monitoring
Governance, risks & Compliance
Information & Cyber security
Business continuity
Data privacy
Risk management
At TrustPoint, security is a top priority. We encourage responsible disclosure of any vulnerabilities through our bounty program. If you discover a security issue, please email us at security@trustpoint.ai with a detailed description of your findings. If the issue is deemed relevant, you may be eligible for compensation. We appreciate your efforts in helping us maintain a secure platform.