Trust Center

Security at Trustpage

Security, privacy, and reliability are at the core of our DNA. We’re leading the way in creating a new era of trust in software.

Show Navigation
  • Compliance
  • Product Security
  • Data Security
  • Privacy
  • Incident Management & Response
  • Availability & Reliability
  • Organizational Security
  • Business Continuity
  • Infrastructure
  • Threat Management
  • Subprocessors
  • Report an Issue
  • Compliance

    Last updated Fri, Jun 4, 2021
    • CCPA

      Trustpage is fully committed to the California Consumer Privacy Act (CCPA). The CCPA is a law that allows any California consumer to request all the information a company has saved on them, as well as a full list of all the third parties that data is shared with. If you wish to request your information that Trustpage has collected from you, please submit your request to

    • GDPR

      Trustpage is in full support of the General Data Protection Regulation (GDPR). GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. The regulation allows EU citizens to request all the information a company has saved on them, in addition to requesting that all personal information is removed from a company's systems and any subprocessors who have handled their data. If you wish to request your information that Trustpage, and its subprocessors, have collected from you, please submit your request to

  • Product Security

    Last updated Fri, Jun 4, 2021

    We’re committed to building a product with a robust set of security features to keep you and your customers safe.

    • Audit Logs

      Trustpage audit logs capture all changes made to trust center content including topics, roadmap items, FAQs, and resources. The log tracks the type of change, the time it happened, the member who made the change, and when applicable, the version history of the change. This includes all comments and member activity such as invitations and joins.

    • Google SSO

      Google SSO enables Gmail and G Suite users to sign in to other applications such as Trustpage using their Google account. SSO simplifies the management of passwords and identity, helping improve security by reducing the potential for stolen passwords among other attacks.

  • Data Security

    Last updated Tue, Nov 9, 2021
    • Data Encrypted At-Rest

      Trustpage data is hosted at Heroku, a Salesforce Company. All data is encrypted at rest with AES-256, block-level storage encryption. Keys are managed by Amazon, and individual volume keys are stable for the lifetime of the volume. You can find more detail about EBS encryption here.

    • Data Encrypted In-Transit

      Trustpage uses HTTPS for all applications and SSL for all database connections to protect sensitive data transmitted to and from applications.

    • Passwords Encrypted

      Trustpage uses Auth0 for authentication. Auth0 only stores passwords for users that do not use SSO. Auth0 never stores passwords in cleartext—they are always hashed and salted securely using bcrypt.

  • Privacy

    Last updated Fri, Dec 3, 2021
    • Privacy Policy
      Privacy Policy

      Your privacy is important to us. It is Trustpage's policy to respect your privacy regarding any information we may collect from you across our website. Trustpage only collects data that we need and only retains it for as long as necessary.

      Trustpage does not share any personally identifying information publicly or with third-parties, except when required to by law.

    • Third-Party Cookie Commitment

      Trustpage has made a commitment from day one to not use third-party cookies to protect the privacy rights of our users. If you want to support our campaign against third-party cookies, please read How to make sure you are not allowing third-party cookies.

    • Data Protection Officer (DPO)

      Trustpage has appointed Jay Lloyd, Head of Trust, as its Data Protection Officer (DPO).

  • Incident Management & Response

    Last updated Fri, Jun 25, 2021
    • Data Breach Notification

      In the event of unauthorized access to data, Trustpage will notify its customers and other affected parties about the breach within 24 hours, or as required by law, as well as take specific steps to remedy the situation to prevent future incidents.

    • Incident Response Plan (IRP)

      Trustpage has an Incident Response Policy that outlines its Security Incident management process. The policy describes escalation procedures and communication plans in case of an incident. It ensures incidents are remediated as quickly as possible and keeps affected customers informed.

  • Availability & Reliability

    Last updated Fri, Nov 12, 2021
    • Quality Assurance Testing

      Trustpage follows a Change Management process for changes to production software. All code changes must undergo a peer code review and include automated unit, functional, and security testing. Testing is performed after deployments to validate application functionality. If validation fails, the application is rolled back to its previous version.

    • Service Monitoring

      Trustpage uses Datadog to monitor its systems to detect service-related issues. The Trustpage team is alerted 24x7 when the threshold criteria is exceeded.

    • Status Page
      Status Page

      Trustpage's system availability can be viewed in real-time.

  • Organizational Security

    Last updated Thu, Sep 30, 2021
    • Confidentiality Agreements

      Trustpage will provide documents upon request. Please submit your request to

    • Employee Security Training

      Trustpage employees undergo monthly Security Awareness training provided by Curricula.

    • Employee Workstations Automatically Locked

      Trustpage uses Fleetsmith for device management. Employee devices automatically lock after a period of inactivity and immediately requires a password to unlock.

    • Employee Workstations Encrypted
    • Secure Remote Network Access

      Trustpage's employee workstations use NordLayer's VPN is to provide end-to-end encryption to provides a private, secure connection to the internet. VPN connections are monitored regularly and employees are alerted if they are disconnected from the network.

  • Business Continuity

    Last updated Fri, Jun 4, 2021
    • Business Continuity Plan
    • Data Backups

      Trustpage has automated data backups that run daily to protect against data loss.

  • Infrastructure

    Last updated Tue, Nov 9, 2021

    Trustpage hosts its application at Heroku, a Salesforce company. Heroku’s physical infrastructure is hosted and managed within Amazon’s secure data centers and utilize the Amazon Web Service (AWS) technology. Amazon continually manages risk and undergoes recurring assessments to ensure compliance with industry standards. For additional information visit the AWS Security page.

    • FISMA - Moderate - Data Center
    • ISO 27001 - Data Center
    • PCI-DSS - Level 1 - Data Center
    • SOC 2 Type II - Data Center
    • Sarbanes-Oxley (SOX) - Data Center
    • Physical Access Control - Data Center

      Trustpage host its applications at Heroku, a Salesforce company. Heroku utilizes ISO 27001 and FISMA certified data centers managed by Amazon. Amazon has many years of experience in designing, constructing, and operating large-scale data centers. This experience has been applied to the AWS platform and infrastructure. AWS data centers are housed in nondescript facilities, and critical facilities have extensive setback and military grade perimeter control berms as well as other natural boundary protection. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, state-of-the-art intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication no fewer than three times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff.

      Amazon only provides data center access and information to employees who have a legitimate business need for such privileges. When an employee no longer has a business need for these privileges, his or her access is immediately revoked, even if they continue to be an employee of Amazon or Amazon Web Services. All physical and electronic access to data centers by Amazon employees is logged and audited routinely.

      For additional information see:

    • Environmental Safeguards - Data Center

      Trustpage hosts its data and application at Heroku, a Salesforce company. Heroku utilizes the following safeguards:

      Fire Detection and Suppression

      Automatic fire detection and suppression equipment have been installed to reduce risk. The fire detection system utilizes smoke detection sensors in all data center environments, mechanical and electrical infrastructure spaces, chiller rooms, and generator equipment rooms. These areas are protected by either wet-pipe, double-interlocked pre-action, or gaseous sprinkler systems.


      The data center electrical power systems are designed to be fully redundant and maintainable without impact to operations, 24 hours a day, and seven days a week. Uninterruptible Power Supply (UPS) units provide back-up power in the event of an electrical failure for critical and essential loads in the facility. Data centers use generators to provide backup power for the entire facility.

      Climate and Temperature Control

      Climate control is required to maintain a constant operating temperature for servers and other hardware, which prevents overheating and reduces the possibility of service outages. Data centers are conditioned to maintain atmospheric conditions at optimal levels. Monitoring systems and data center personnel ensure temperature and humidity are at the appropriate levels.


      Data center staff monitor electrical, mechanical, and life support systems and equipment so issues are immediately identified. Preventative maintenance is performed to maintain the continued operability of equipment.

      For additional information see:

  • Threat Management

    Last updated Fri, Aug 27, 2021
    • Bug Bounty
      View Program

      Trustpage takes the security of our systems seriously, and we value the security community. The disclosure of security vulnerabilities helps us ensure the security and privacy of our users.

      We require that all researchers:

      • Make every effort to avoid privacy violations, degradation of user experience, disruption to production systems, and destruction of data during security testing
      • Perform research only within the scope set out below
      • Use the identified communication channels to report vulnerability information to us
      • Keep information about any vulnerabilities you’ve discovered confidential between yourself and Trustpage until we’ve had 90 days to resolve the issue.

      If you follow these guidelines when reporting an issue to us, we commit to:

      • Not pursue or support any legal action related to your research
      • Work with you to understand and resolve the issue quickly (including an initial confirmation of your report within 72 hours of submission)
      • Recognize your contribution on our Security Researcher Hall of Fame, if you are the first to report the issue and we make a code or configuration change based on the issue
      • Consider paying a cash reward if the vulnerability is determined to be of high impact and probability

      The impact assessment is based on the attack’s potential for causing privacy violations, financial loss, and other user harm, as well as the user-base reached.

      The probability assessment takes into account the technical skill set needed to conduct the attack, the potential motivators of such an attack, and the likelihood of the vulnerability being discovered by an attacker.

      If you believe you’ve found a security vulnerability in one of our products or platforms please send it to us by emailing Please include the following details with your report:

      • Description of the location and potential impact of the vulnerability;
      • A detailed description of the steps required to reproduce the vulnerability (POC scripts, screenshots, and compressed screen captures are all helpful to us); and
      • Your name/handle and a link for recognition in our Hall of Fame.

      To learn more about the qualifying vulnerabilities that apply to our program, please read our full Vulnerability Disclosure Policy.

    • Dynamic Application Security Testing (DAST)

      Trustpage uses ZAP to scan its web applications. ZAP crawls our applications and examines the responses from the application to identify security vulnerabilities. Vulnerability reports are reviewed for risk assessment and prioritized for remediation.

    • Static Application Security Testing (SAST)

      Trustpage uses Snyk to scan its source code. Snyk detects security vulnerabilities in our application code and open source packages. Vulnerability reports are reviewed for risk assessment and prioritized for remediation.

  • Subprocessors

    Last updated Mon, Nov 29, 2021
    • Name
      Authentication and authorization
      Logging and monitoring
      DNS and Hosting provider
      Data service provider
      Hosting service provider
      CRM integration (optional)
      Integration services
      CRM integration (optional)
      Email service provider
      Notification services (optional)
  • Report an Issue

    If you believe you've discovered a security-related issue, please contact us at