Trust center·Security questionnaire
Security questionnaire.
Common security assessment questions, answered, to streamline your vendor risk review. Pre-filled CAIQ / SIG responses are available under NDA on request.
Common questions
Describe your information security governance model.
SecuritySaksho operates under an Information Security Management System (ISMS) aligned with ISO 27001. Governance includes risk assessment, policy development, management review, and continuous improvement cycles.
What encryption standards do you use?
SecurityAES-256 for data at rest and TLS 1.3 for data in transit. Encryption keys are managed securely with rotation policies.
Where is customer data stored?
InfrastructureCustomer data is stored in AWS US regions (US-East-1, US-West-2) with multi-region redundancy. We do not transfer data outside these regions without explicit consent.
Are you SOC 2 compliant?
ComplianceOur SOC 2 Type II audit is underway. The current report is available to customers and qualified prospects under NDA on request.
What is your incident response time?
OperationsAverage incident response time is approximately two hours. We maintain 24x7 monitoring with documented incident response procedures tested quarterly.
Do you support SSO?
Access controlYes. We support OIDC and SAML 2.0 SSO integration with major providers including Okta, Microsoft Entra ID, and Google Workspace.
Need more detail?
Our security team can walk your team through controls, share documentation under NDA, and answer assessment questionnaires.
