Back to Knowledge Base
Billing & Compliance 5 MIN READ

SOC2 & ISO 27001 Compliance

How Trustity helps you meet regulatory requirements for access control and logging.

Audit Ready

Trustity is designed to satisfy the strictest compliance frameworks.

Mapped Controls

  • CC6.1 (Logical Access): Our PAM module ensures privileged access is restricted and rotated.
  • CC6.7 (Transmission): All data is encrypted in transit (TLS 1.3) and at rest (AES-256).
  • A.12.3.1 (Information Backup): Vault backups are automated and geographically distributed.

You can export a full Audit Report from the Settings menu to provide directly to your auditor.

Was this article helpful?

Your feedback helps us improve Trustity docs.

LAST UPDATED: JAN 17, 2026