Security Questionnaire FAQ

Last updated: February 2026

Classification: NDA-scoped reviewer documentation

Common Questions

Do you have a documented incident response process?

Yes. See Incident Response for lifecycle and communication approach.

How do you manage vulnerabilities?

We use regular dependency and platform updates, controlled deployment workflows, and remediation through runbooks and operational checks.

How are access controls enforced?

Access is role-based. Internal docs and sensitive operational content are restricted and require authenticated access with additional role checks.

How do you handle backups and recovery?

Operational backup and recovery processes are documented and exercised for critical data paths. Customer communication is prioritized for material impact.

How can customers request deletion or data access?

Submit requests to [email protected]. See Data Handling.

What We Can Share During Review

  • Public Trust Center materials (always available)
  • Completed security questionnaires
  • Additional architecture and operational details under NDA and scoped access controls

Back to Trust Center