Trust center·Security questionnaire

Security questionnaire.

Common security assessment questions, answered, to streamline your vendor risk review. Pre-filled CAIQ / SIG responses are available under NDA on request.

Common questions

Describe your information security governance model.

Security

Saksho operates under an Information Security Management System (ISMS) aligned with ISO 27001. Governance includes risk assessment, policy development, management review, and continuous improvement cycles.

What encryption standards do you use?

Security

AES-256 for data at rest and TLS 1.3 for data in transit. Encryption keys are managed securely with rotation policies.

Where is customer data stored?

Infrastructure

Customer data is stored in AWS US regions (US-East-1, US-West-2) with multi-region redundancy. We do not transfer data outside these regions without explicit consent.

Are you SOC 2 compliant?

Compliance

Our SOC 2 Type II audit is underway. The current report is available to customers and qualified prospects under NDA on request.

What is your incident response time?

Operations

Average incident response time is approximately two hours. We maintain 24x7 monitoring with documented incident response procedures tested quarterly.

Do you support SSO?

Access control

Yes. We support OIDC and SAML 2.0 SSO integration with major providers including Okta, Microsoft Entra ID, and Google Workspace.

Need more detail?

Our security team can walk your team through controls, share documentation under NDA, and answer assessment questionnaires.