Security Questionnaire Starter Pack
Last updated: February 2026
Classification: NDA-scoped reviewer documentation
What this is
This page gives concise answers to common vendor security questionnaire topics. For deeper review, see linked Trust Center pages and request scoped review support.
This content is intended for NDA-approved reviewers and should not be redistributed outside the review process.
Common Topics and Fast Answers
| Topic | Summary answer | Details |
|---|---|---|
| Data handling | We document data categories, processing boundaries, and deletion requests. | Data Handling |
| Retention and deletion | We define request channels, retention approach, and deletion workflow timing. | Data Retention and Deletion |
| Access control | Restricted resources use role-based access with least privilege and revocation. | Security Overview |
| Incident response | We follow a defined incident lifecycle and customer communication process. | Incident Response |
| Vulnerability management | We perform ongoing dependency and infrastructure updates with controlled release workflows. | Security Overview |
| Availability and recovery | We maintain backup/recovery and continuity procedures for critical paths. | Availability and BCDR |
| Subprocessors | We publish subprocessor service categories and governance approach. | Subprocessors |
Template Download
Download and adapt our baseline questionnaire template: Vendor Security Questionnaire Template
Need Additional Review?
Send questionnaires and timelines to [email protected]. Restricted details may require NDA and scoped role-based access.