CloudThinker logoCloudThinker

CloudThinker Trust Center

CloudThinker is in compliance with security best practices, has implemented and is monitoring comprehensive controls, and maintains policies to outline its security procedures.

Compliance

Resources

SOC 2 Type I Report
Personnel Security Policy
Acceptable Use Policy
Information Security Policy
Access Control and Termination Policy

Controls

Access control procedures
User list with assigned roles and privileges
Access review of infrastructure
Physical access control systems
Login page
Encryption of data
Backup and recovery policy
Penetration testing
Source code tool
Web application firewall
Vulnerability assessments policy
Vulnerability scanning
Network diagram
Monitoring tool
Infrastructure baseline hardening policy
Infrastructure firewall
SSL/TLS certificates for infrastructure
Alerts and remediation
Breach notification communication
Security incident list
Whistleblower policy
Log management tool
Vendor management program
Vendor onboarding
Vendor list
Vendor termination
Employee handbook
New employee and contractor agreements
List of active employees & contractors as on date
Existing employee and contractor agreements
List of newly hired employees & contractors
Asset register maintaining
Multi-availability zones
Risk and Governance Executive Committee meeting minutes
Risk management program
Internal communication for changes in roles
Intellectual property rights
Performance improvement program
Board meeting minutes
Board charter

Subprocessors

Google Workspace
Google WorkspaceBusiness Apps & Productivity
Cloudflare
CloudflareNetwork & Edge Security
AWS
AWSCloud Infrastructure & Platform Services
gitlab.com
gitlab.comUnknown Category