Robusta SystemsTrust Portal

Start your security review

View & download sensitive information

Overview

Share your security posture with prospects and customers.

Compliance

SOC 2 II
SOC 2 Type II
SOC 3
SOC 3
ISO 27001
ISO/IEC 27001:2022
ISO 27017
ISO/IEC 27017:2015
CSA STAR
CSA STAR Level 1
NIST 800-53
NIST 800-53
CIS
CIS Controls
GDPR
GDPR

Sub-Processors

(10)

Third-party vendors that process data on our behalf

Vendor
Cloud Infrastructure
United States
Cloud Infrastructure
United States
Payment Processing
United States
Monitoring & Observability
United States
Error Tracking
United States
Email Delivery
United States
Customer Support
United States
CDN & Security
United States
Code Repository
United States
Slack
Team Communication
United States

Security FAQ

(10)

Common security questions and answers

Documents

Application & Interface Security

  • Application Security Testing
  • Secure Development Lifecycle
  • Code Review
  • API Security

Change Control & Configuration Management

  • Change Management Process
  • Configuration Management
  • Release Management
  • Rollback Procedures

Cryptography, Encryption & Key Management

  • Encryption at Rest
  • Encryption in Transit
  • Key Management
  • Certificate Management

Datacenter Security

  • Physical Access Controls
  • Environmental Controls
  • Video Surveillance
  • Power Redundancy

Data Security & Privacy

  • Data Classification
  • Data Retention Policy
  • Data Residency
  • Privacy Policy

Governance, Risk & Compliance

  • Information Security Policy
  • Risk Assessment
  • Risk Register
  • Security Governance

Audit & Assurance

  • SOC 2 Type II
  • ISO 27001
  • Independent Audits
  • Internal Audits

Human Resources Security

  • Background Checks
  • Security Awareness Training
  • Acceptable Use Training
  • Role-Based Training

Identity & Access Management

  • Multi-Factor Authentication
  • Single Sign-On
  • Role-Based Access Control
  • Least Privilege Principle

Infrastructure & Virtualization Security

  • Cloud Provider Security
  • Network Segmentation
  • Firewall Protection
  • DDoS Protection

Interoperability & Portability

  • Data Export
  • API Access
  • Standard Data Formats
  • Migration Assistance

Logging & Monitoring

  • Security Event Logging
  • Centralized Log Management
  • Real-Time Monitoring
  • Log Retention

Security Incident Management

  • Incident Response Plan
  • Incident Response Team
  • Incident Classification
  • Customer Notification

Supply Chain Management

  • Vendor Security Assessment
  • Subprocessor List
  • Vendor Risk Management
  • Contractual Security Requirements

Threat & Vulnerability Management

  • Vulnerability Scanning
  • Patch Management
  • Threat Intelligence
  • Vulnerability Remediation SLA

Universal Endpoint Management

  • Endpoint Detection & Response
  • Mobile Device Management
  • Disk Encryption
  • Anti-Malware Protection