
Trust Center

Trust Center

Trust Center
Overview
At Roster, our commitment to compliance and security drives every facet of our operations. We have achieved AICPA SOC 2 Type II certification through Thoropass, demonstrating our rigorous adherence to the core trust principles of security, availability, processing integrity, confidentiality, and privacy. Our controls are subject to continuous oversight, testing, and improvement, ensuring that we consistently meet or exceed industry standards. From data handling to infrastructure management, we uphold strict governance and accountability measures to protect our customers’ information and maintain uncompromising trust in our platform.
Overview
At Roster, our commitment to compliance and security drives every facet of our operations. We have achieved AICPA SOC 2 Type II certification through Thoropass, demonstrating our rigorous adherence to the core trust principles of security, availability, processing integrity, confidentiality, and privacy. Our controls are subject to continuous oversight, testing, and improvement, ensuring that we consistently meet or exceed industry standards. From data handling to infrastructure management, we uphold strict governance and accountability measures to protect our customers’ information and maintain uncompromising trust in our platform.
Overview
At Roster, our commitment to compliance and security drives every facet of our operations. We have achieved AICPA SOC 2 Type II certification through Thoropass, demonstrating our rigorous adherence to the core trust principles of security, availability, processing integrity, confidentiality, and privacy. Our controls are subject to continuous oversight, testing, and improvement, ensuring that we consistently meet or exceed industry standards. From data handling to infrastructure management, we uphold strict governance and accountability measures to protect our customers’ information and maintain uncompromising trust in our platform.
Compliance

Compliance

Compliance

Roster Is Trusted By









Roster Is Trusted By









Roster Is Trusted By









Documents
Pentest Report
SOC 2 Report
Info Sec Report
Documents
Pentest Report
SOC 2 Report
Info Sec Report
Documents
Pentest Report
SOC 2 Report
Info Sec Report
Endpoint Security
Disk Encryption
Endpoint Detection & Response
Endpoint Security
Disk Encryption
Endpoint Detection & Response
Endpoint Security
Disk Encryption
Endpoint Detection & Response
Data Security
Data Backups
Data Deletion / Data Retention
Encryption-at-rest
Data Security
Data Backups
Data Deletion / Data Retention
Encryption-at-rest
Data Security
Data Backups
Data Deletion / Data Retention
Encryption-at-rest
Risk Profile
Third Party Dependencies
Yes
Hosting
Major Cloud Provider
Risk Profile
Third Party Dependencies
Yes
Hosting
Major Cloud Provider
Risk Profile
Third Party Dependencies
Yes
Hosting
Major Cloud Provider
Access Control
Bring Your Own Device (BYOD)
Data Access
Access Control
Bring Your Own Device (BYOD)
Data Access
Access Control
Bring Your Own Device (BYOD)
Data Access
App Security
Responsible Disclosure
Application Penetration Testing
Code Analysis
App Security
Responsible Disclosure
Application Penetration Testing
Code Analysis
App Security
Responsible Disclosure
Application Penetration Testing
Code Analysis
Legal
Subprocessors
Cyber Insurance
Data Processing Agreement
Legal
Subprocessors
Cyber Insurance
Data Processing Agreement
Legal
Subprocessors
Cyber Insurance
Data Processing Agreement
Data Privacy
Cookies
Data Breach Notification
Data Privacy Officer
Data Privacy
Cookies
Data Breach Notification
Data Privacy Officer
Data Privacy
Cookies
Data Breach Notification
Data Privacy Officer
Infrastructure
Status Monitoring
All Systems Operational
Azure
BC/DR
Infrastructure
Status Monitoring
All Systems Operational
Azure
BC/DR
Infrastructure
Status Monitoring
All Systems Operational
Azure
BC/DR
Network Security
Data Exfiltration Monitoring
DMARC
Firewall
Network Security
Data Exfiltration Monitoring
DMARC
Firewall
Network Security
Data Exfiltration Monitoring
DMARC
Firewall
Corporate Security
Asset Management Practice
Email Protection
Employee Training
Corporate Security
Asset Management Practice
Email Protection
Employee Training
Corporate Security
Asset Management Practice
Email Protection
Employee Training
Incident Response
Incident Response Plan
Incident Response
Incident Response Plan
Incident Response
Incident Response Plan
Risk Management
Risk Assessment
Supply Chain Risk Management
Risk Management
Risk Assessment
Supply Chain Risk Management
Risk Management
Risk Assessment
Supply Chain Risk Management