Trudenty logoTrudenty

Trudenty Trust Center

At Trudenty, security isn't just a feature—it's foundational to everything we build. Our security-first mindset drives our development processes, infrastructure decisions, and organizational policies. We treat the data entrusted to us—whether from our customers, their end users, or anyone who interacts with our organization—with the utmost care and responsibility. Security is embedded in our DNA, enabling us to deliver innovative solutions without compromising on protection.

Compliance

Resources

SOC 2 Type I Report
ISO 27001 Certificate
Access Control and Termination Policy
Business Continuity and Disaster Recovery
Acceptable Use Policy

Controls

Access control procedures
Access review of infrastructure
Physical access control systems
VPN access
Multifactor authentication
Encryption of data
Backup and recovery policy
Source code tool
Web application firewall
Vulnerability scanning
Outsourced Development Management
Business continuity and disaster recovery testing
Intrusion detection tool
Infrastructure baseline hardening policy
SSL/TLS certificates for infrastructure
Monitoring, measurement, analysis and evaluation
Monitoring tool
Alerts and remediation
Security incident list
Breach notification communication
Whistleblower policy
Log management tool
Vendor management program
Vendor termination
Vendor list
Vendor onboarding
New employee and contractor agreements
Existing employee and contractor agreements
Employee handbook
List of newly hired employees & contractors
Security awareness training implemented
Multi-availability zones
Asset register maintaining
Risk and Governance Executive Committee meeting minutes
Risk management program
Patch management
Antivirus and malware configurations
Customer termination
Asset register list
Termination checklist