Rimsys Trust Center
At Rimsys, security is foundational to how we design, build, and operate our platform. A security-first mindset informs our development practices, infrastructure architecture, and organizational policies across the company. We treat the data entrusted to us—by our customers, their users, and partners—with care and responsibility. Security controls are embedded in our systems and processes to protect, maintain the integrity of, and ensure the availability of customer data while enabling the reliable delivery of our services. Our security and compliance program is independently validated through recognized third-party audits, including SOC 2 and ISO/IEC 27001. These assessments provide assurance regarding the design and operating effectiveness of our security controls and serve as the authoritative basis for evaluating our security posture. Customers and partners are encouraged to rely on the materials available in this trust center for security, compliance, and regulatory assessments.
Compliance
Resources
Controls
Subprocessors
FAQs
Emergency changes that can't follow regular processes due to urgency require immediate attention and discussion with a relevant service manager. Such changes are formally approved retrospectively after implementation. These emergency changes are later reviewed in periodic meetings to analyze lessons learned, root causes, and impacts.
Source code changes are logged, time-stamped, and attributed to their author in a source code management tool. Access to the source code tool is restricted to authorized users using multi-factor authentication.
All systems are patched and updated on a documented, regular, and timely schedule using the Common Vulnerability Scoring System (CVSS) to aid in setting patching guidelines. Critical security vulnerabilities must be patched as soon as possible regardless of CVSS score.