Trust Center

Trust Center

Enterprise-grade security is built into everything we do. Access our security documentation, compliance certifications, and governance information.

Certifications & Compliance

SUPERWISE maintains industry-leading security certifications and undergoes regular third-party audits.

SOC 2 Type II

SOC 2 Type II

Annual audit of security, availability, and confidentiality controls

Active

Last audit: December 2024

GDPR

GDPR

European data protection regulation compliance

Active

Last audit: Ongoing

HIPAA

HIPAA

Healthcare data protection compliance

Active

Last audit: December 2024

ISO 27001

ISO 27001

Information security management system certification

Active

Last audit: November 2024

Security Controls

Defense in depth across infrastructure, application, and data layers.

Encryption

All data encrypted at rest (AES-256) and in transit (TLS 1.3). Customer data keys managed via AWS KMS with automatic rotation.

  • AES-256 at rest
  • TLS 1.3 in transit
  • AWS KMS key management
  • Automatic key rotation

Infrastructure

Deployed on SOC 2 compliant cloud infrastructure with multi-region redundancy and automatic failover.

  • AWS & GCP hosting
  • Multi-region deployment
  • 99.99% uptime SLA
  • Automatic failover

Access Control

Role-based access control with SSO/SAML support. All access logged with immutable audit trails.

  • RBAC with custom roles
  • SSO/SAML integration
  • MFA enforcement
  • Audit logging

Secrets Management

Zero plaintext secrets. All credentials stored in dedicated secrets management with automatic rotation.

  • HashiCorp Vault
  • No plaintext storage
  • Automatic rotation
  • Least privilege

Vulnerability Management

Continuous security scanning with regular penetration testing and responsible disclosure program.

  • Daily dependency scans
  • Quarterly pen tests
  • Bug bounty program
  • 24hr critical patches

Incident Response

Documented incident response plan with defined SLAs. Security team on-call 24/7.

  • 24/7 security team
  • < 1hr P0 response
  • Runbook automation
  • Post-incident reviews

Security Documentation

Access detailed security documentation for your evaluation. Some documents require NDA.

SOC 2 Type II Report

Independent auditor report on security, availability, and confidentiality controls.

NDA Required

Security Whitepaper

Technical overview of SUPERWISE security architecture and controls.

Public

Penetration Test Summary

Executive summary of most recent third-party penetration test.

NDA Required

Data Processing Agreement

Standard DPA for GDPR compliance.

Public

SIG Lite Questionnaire

Pre-filled Standardized Information Gathering questionnaire.

Available on Request

Business Continuity Plan

Overview of disaster recovery and business continuity procedures.

NDA Required

Request Security Documentation

Fill out the form below to request access to security documentation including SOC 2 reports, penetration test summaries, and pre-filled questionnaires.

What You'll Receive

  • SOC 2 Type II audit report (under NDA)
  • Penetration test executive summary
  • Pre-filled SIG/CAIQ questionnaire
  • Architecture & data flow diagrams
Response within 1 business day
Enterprise evaluation support available

Security questions?

security@superwise.ai

Ready to Evaluate SUPERWISE?

Our team is here to support your security evaluation process.

Related Content

Continue your journey: Explore related solutions, use cases, and resources to find your next step.