Note: This is a Realistic Example
This example shows a growth-stage company (~Series A/B) that's actively building their security program. Not everything is perfect—and that's intentional. This is what honest, confident positioning looks like when you're still growing.
Data Security & Privacy
Q: How is my data encrypted?
All customer data is encrypted at rest using AES-256 encryption via AWS's default encryption. Data in transit is protected via TLS 1.2+. We're working toward customer-managed keys (CMK) for enterprise customers—currently on our roadmap for Q3.
Q: Where is my data stored?
Customer data is stored in AWS us-east-1 (N. Virginia). We don't currently offer EU data residency, but it's on our roadmap as we expand internationally. For EU customers today, we offer a DPA and all our infrastructure sub-processors are GDPR compliant.
Q: How long do you retain my data after contract termination?
Upon contract termination, we retain customer data for 30 days to allow for export requests. After this period, data is deleted from production within 14 days. Full purge from backups within 60 days. We can provide deletion confirmation on request.
Access Control & Authentication
Q: What authentication options do you support?
We currently offer email/password with MFA via authenticator apps (TOTP). SSO via SAML 2.0 is in development, targeted for Q2. For now, we can accommodate enterprise customers with strong password policies and required MFA for all users.
Q: How do you manage employee access to customer data?
We follow least-privilege principles. Only our engineering team (5 people) has production access, and it's logged. We're implementing just-in-time access as we grow. Currently, access reviews happen monthly with our CTO. We don't look at customer data without explicit support requests.
Compliance & Certifications
Q: What compliance certifications do you hold?
We're currently in our SOC 2 Type II audit with Prescient Assurance, with expected completion in Q2 2025. We've passed our readiness assessment with no critical gaps. In the meantime, we're happy to walk through our controls directly or share our security documentation. We're also GDPR compliant with a DPA available.
Q: Do you support HIPAA?
Not currently. HIPAA compliance is on our roadmap but not yet implemented. If you have healthcare data requirements, let's discuss your specific needs—there may be architectural approaches that work for both of us, or we can provide a timeline for HIPAA readiness.
Vulnerability Management
Q: How often do you conduct penetration testing?
We completed our first third-party penetration test in Q4 2026. All high/critical findings were remediated within 30 days. We plan to continue annually. Executive summary available under NDA.
Q: How do you handle vulnerability management?
We use Snyk for dependency scanning (integrated into CI/CD) and run infrastructure scans monthly. Remediation targets: Critical within 72 hours, High within 14 days. We're building toward continuous scanning as we grow the team.
Incident Response
Q: What happens if you have a security breach?
We have a documented Incident Response Plan. Our CTO leads response with support from our external security advisor. For confirmed breaches affecting customer data, we commit to notification within 72 hours. We haven't had to use this process for a customer-impacting incident.
Q: Have you experienced any security breaches?
We have not experienced a breach affecting customer data. We've handled routine security events (blocked attacks, phishing attempts on employees) without customer impact. We believe in transparency and are happy to discuss our security history directly.
Business Continuity
Q: What is your uptime SLA?
We offer 99.5% uptime SLA. Our trailing 6-month actual availability is 99.8%. We're a growing company—99.9% SLA is planned once we complete additional redundancy work later this year. Real-time status: status.example.com
Q: What are your RTO and RPO?
Target RTO: 8 hours. Target RPO: 4 hours (daily backups). We've tested backup restoration but haven't done a full DR drill yet—that's planned for this quarter. Backups are encrypted and stored in a separate AWS region.