Superlinked logoSuperlinked

Superlinked Trust Center

At Superlinked, security isn't just a feature—it's foundational to everything we build. Our security-first mindset drives our development processes, infrastructure decisions, and organizational policies. We treat the data entrusted to us—whether from our customers, their end users, or anyone who interacts with our organization—with the utmost care and responsibility. Security is embedded in our DNA, enabling us to deliver innovative solutions without compromising on protection.

Compliance

Resources

SOC 2 Type II Report
Vendor Management Policy
Information Technology Leadership Committee Charter
Risk Assessment and Treatment Policy
Acceptable Use Policy

Controls

Source code access restricted and changes logged
Access control procedures
Multi-factor authentication enforced for production access
Quarterly user access reviews performed
Termination Access Revocation Checklist
Data encrypted at rest
Customer data deleted after termination
Backup and recovery policy
Outsourced development security requirements managed
Source code changes tested and approved
Secure connection means utilized
Web application firewalls configuration
External Attack Surface Vulnerability Scanning & Remediation
Anti-malware monitoring
Intrusion detection tool
Infrastructure firewall
Monitoring tool
Centralized Log Collection and Monitoring
Business continuity & disaster recovery plans documented and tested
Security incident logging and review
Breach notification communication
Visitor sign-in, badging, and escort policy
Technology assets inventoried
Documented Vendor Management Program
Vendor termination
Vendor list
Vendor onboarding
Confidentiality Agreement acknowledged by employees
List of active employees & contractors as on date
Employee handbook
List of newly hired employees & contractors
Security awareness training implemented
Whisteblower mechanism maintained
Multi-availability zones
Documentation available to internal and external users
Customer support channels available
Asset register maintaining
Risk and Governance Executive Committee meeting minutes
Risk management program
Information security policies and procedures
Patch management process developed
Production system hardening and baseline configuration management
Reported security concerns addressed and resolved
Organization chart