Enterprise-grade security & compliance

Your data and your clients' data deserves the highest level of protection. We've built security and compliance into every aspect of TrustRegister.

Security architecture

End-to-End Encryption

All data encrypted in transit (TLS 1.3) and at rest (AES-256). Keys managed with HSM.

  • TLS 1.3 for all connections
  • AES-256 encryption at rest
  • Hardware Security Modules (HSM)
  • Key rotation every 90 days

UK/EU Data Hosting

Data hosted exclusively in UK and EU data centers with ISO 27001 certification.

  • Primary: London (AWS eu-west-2)
  • Secondary: Frankfurt (AWS eu-central-1)
  • ISO 27001 certified facilities
  • SOC 2 Type II compliance

Access Controls

Role-based access with multi-factor authentication and audit logging.

  • Role-based permissions (RBAC)
  • Multi-factor authentication (MFA)
  • Single sign-on (SSO) support
  • Complete access audit trails

Monitoring & Logging

24/7 security monitoring with comprehensive audit trails and alerting.

  • Real-time threat monitoring
  • Comprehensive audit logging
  • Automated security alerts
  • Incident response procedures

Data Integrity

Cryptographic hashing and immutable logs ensure evidence cannot be tampered with.

  • SHA-256 cryptographic hashing
  • Immutable evidence logs
  • Blockchain-style integrity checks
  • Tamper-evident evidence packs

Compliance Framework

Built for regulatory compliance with comprehensive documentation and controls.

  • GDPR compliance by design
  • Data Processing Agreements (DPA)
  • Right to be forgotten support
  • Regular compliance audits

Secure data flow

1

Data Ingestion

Client data imported via encrypted API or secure file upload

2

Processing

Data processed in secure, isolated environments with audit logging

3

Verification

Secure routing to verification providers with minimal data exposure

4

Evidence Creation

Cryptographically signed evidence packs generated and stored

5

Retention

Secure 7-year retention with automated deletion and audit trails

Compliance & certifications

Cyber Essentials Plus

UK government cybersecurity certification

Target: Q2 2025
In Progress

ISO 27001

International information security management

Target: Q3 2025
In Progress

SOC 2 Type II

Service organization controls audit

Target: Q4 2025
Planned

GDPR Compliance

General Data Protection Regulation

Target: Current
Complete

Infrastructure & hosting

AWS Infrastructure

Hosted on Amazon Web Services with 99.99% uptime SLA and automatic failover

Data Residency

All data stored in UK/EU data centers with no cross-border transfers

Backup & Recovery

Daily encrypted backups with 4-hour Recovery Time Objective (RTO)

Data protection & privacy

What we collect

  • • Company and officer names (from Companies House)
  • • Email addresses and phone numbers for invitations
  • • Verification status and completion timestamps
  • • Audit logs and evidence metadata

What we DON'T collect

  • • Biometric data or identity documents
  • • Personal details beyond verification needs
  • • Financial or sensitive personal information
  • • Data unrelated to identity verification

Data Controller vs Processor: For verification invitations, you remain the data controller and we act as a processor. For evidence retention, we act as joint controllers to ensure compliance with Companies House requirements.

Questions about our security?

Our security team is happy to answer any questions about our security posture, compliance, or data protection practices.