Global Compliance Standards

Trabster DB meets and exceeds international compliance requirements, ensuring your data meets regulatory standards across industries and regions.

Industry Certifications

Independently audited and certified to meet the highest standards of security and compliance

SOC 2

SOC 2 Type II

Certified

Demonstrates our commitment to:

  • Security of customer data
  • Availability of services
  • Processing integrity
  • Confidentiality controls
  • Privacy protection
ISO

ISO 27001

Certified

Information security management:

  • Risk management framework
  • Security controls
  • Continuous improvement
  • Annual audits
  • Global recognition
ISO

ISO 27017

Certified

Cloud security standards:

  • Cloud-specific controls
  • Shared responsibility
  • Virtual environments
  • Data segregation
  • Cloud governance

Regional & Industry Compliance

Meeting specific regulatory requirements across different regions and industries worldwide

GDPR

European Union

  • • Data protection by design
  • • Right to erasure
  • • Data portability
  • • Privacy controls

CCPA

California, USA

  • • Consumer privacy rights
  • • Data disclosure
  • • Opt-out mechanisms
  • • Non-discrimination

HIPAA

Healthcare

  • • PHI protection
  • • BAA available
  • • Access controls
  • • Audit logging

PCI DSS

Payment Card

  • • Secure networks
  • • Cardholder protection
  • • Access management
  • • Regular monitoring

FedRAMP

US Government

  • • Security assessment
  • • Authorization process
  • • Continuous monitoring
  • • Federal standards

PIPEDA

Canada

  • • Personal information
  • • Consent requirements
  • • Data safeguards
  • • Privacy principles

LGPD

Brazil

  • • Data protection
  • • Legal basis
  • • Rights of holders
  • • International transfer

PDPA

Singapore

  • • Data protection
  • • Consent obligations
  • • Purpose limitation
  • • Notification duty

Audit & Assessment Reports

Penetration Testing

Annual third-party assessment

Independent security experts conduct comprehensive penetration testing of our infrastructure, applications, and APIs annually. All critical findings are remediated within 30 days.

Last tested: Q4 2024

Vulnerability Scanning

Continuous automated scanning

Automated vulnerability scanning runs continuously across our infrastructure and applications. Critical vulnerabilities are addressed within 24 hours of detection.

Running 24/7

Security Code Review

SAST/DAST implementation

All code undergoes security review before deployment. Static and dynamic analysis tools automatically scan for security vulnerabilities in our CI/CD pipeline.

Every deployment

Compliance Audits

Regular certification audits

Independent auditors assess our compliance with SOC 2, ISO 27001, and other standards. Reports are available upon request under NDA.

Annual assessment

Data Privacy & Protection

Data Handling Principles

Data Minimization

We only collect and process data that is necessary for providing our services.

Purpose Limitation

Data is used only for the stated purposes and not further processed incompatibly.

Storage Limitation

Personal data is retained only as long as necessary for the specified purposes.

Integrity & Confidentiality

Data is protected against unauthorized processing and accidental loss.

User Rights

Right to Access

Request access to your personal data and receive a copy of it.

Right to Rectification

Correct inaccurate personal data and complete incomplete data.

Right to Erasure

Request deletion of personal data under certain circumstances.

Right to Data Portability

Receive your data in a structured, commonly used format.

Need Compliance Documentation?

Request our compliance reports, certifications, and audit documentation. Available under NDA for enterprise customers.