Glowing translucent shield form surrounded by concentric rings of amber light
Trust Center

Engineered for the world's strictest regulators.

Independent assurance across information security, privacy, and operational resilience — refreshed annually and available under NDA.

What this is about

Trust is a system, not a certificate on the wall.

We operate under the same controls we recommend to our regulated clients — continuous monitoring, evidence-by-construction, and an audit trail that lets a third party reconstruct any decision, deployment, or data access.

The certifications below represent independent verification, not self-attestation. Reports, statements of applicability, sub-processor lists, and our incident-response playbook are available to qualified buyers under NDA.

Independent certifications & alignment
ISO/IEC 27001:2022
Information Security Management System
NDPA
Nigeria Data Protection Act alignment
SOC 2 Type II
Security and availability controls
ISO/IEC 27701
Privacy Information Management extension
PCI DSS
Payment data security standard alignment
CIA Controls
Confidentiality, Integrity, Availability
BCP / DR
Business continuity and recovery objectives
Audit Readiness
Security awareness and continual improvement
The three pillars of our trust posture

Security by design

Zero-trust networking, least-privilege IAM, hardware-isolated secrets, and continuous attack-surface monitoring across every environment. Every commit runs through SAST, dependency scanning, and IaC policy checks before merge.

Resilience & availability

Multi-AZ deployments, active-active regions for tier-0 workloads, quarterly disaster-recovery exercises with documented runbooks, and 99.99% SLO commitments backed by error-budget governance.

Privacy & data residency

Customer-controlled regions, encryption in transit (TLS 1.3) and at rest (AES-256-GCM), customer-managed BYOK options, and DPA-aligned processor obligations published per sub-processor.

Governance

Documents available on request.

Our Trust portal hosts up-to-date assurance reports and security artifacts. Reach out for access under NDA — typical turnaround is one business day.

Request access
  • ISO/IEC 27001 Statement of ApplicabilityUnder NDA
  • SOC 2 Type II Report (annual)Under NDA
  • Penetration Test SummaryUnder NDA
  • Business Continuity & DR PlanUnder NDA
  • Data Processing Agreement (DPA)Under NDA
  • Sub-processor ListUnder NDA