Trust Center

Trust Center

Trust Center

Overview

At Roster, our commitment to compliance and security drives every facet of our operations. We have achieved AICPA SOC 2 Type II certification through Thoropass, demonstrating our rigorous adherence to the core trust principles of security, availability, processing integrity, confidentiality, and privacy. Our controls are subject to continuous oversight, testing, and improvement, ensuring that we consistently meet or exceed industry standards. From data handling to infrastructure management, we uphold strict governance and accountability measures to protect our customers’ information and maintain uncompromising trust in our platform.

Overview

At Roster, our commitment to compliance and security drives every facet of our operations. We have achieved AICPA SOC 2 Type II certification through Thoropass, demonstrating our rigorous adherence to the core trust principles of security, availability, processing integrity, confidentiality, and privacy. Our controls are subject to continuous oversight, testing, and improvement, ensuring that we consistently meet or exceed industry standards. From data handling to infrastructure management, we uphold strict governance and accountability measures to protect our customers’ information and maintain uncompromising trust in our platform.

Overview

At Roster, our commitment to compliance and security drives every facet of our operations. We have achieved AICPA SOC 2 Type II certification through Thoropass, demonstrating our rigorous adherence to the core trust principles of security, availability, processing integrity, confidentiality, and privacy. Our controls are subject to continuous oversight, testing, and improvement, ensuring that we consistently meet or exceed industry standards. From data handling to infrastructure management, we uphold strict governance and accountability measures to protect our customers’ information and maintain uncompromising trust in our platform.

Compliance

SOC 2 Type II Black

Compliance

SOC 2 Type II Black

Compliance

SOC 2 Type II Black

Roster Is Trusted By

Roster Is Trusted By

Roster Is Trusted By

Pentest Report

SOC 2 Report

Info Sec Report

Pentest Report

SOC 2 Report

Info Sec Report

Pentest Report

SOC 2 Report

Info Sec Report

Endpoint Security

Disk Encryption

Endpoint Detection & Response

Endpoint Security

Disk Encryption

Endpoint Detection & Response

Endpoint Security

Disk Encryption

Endpoint Detection & Response

Data Security

Data Backups

Data Deletion / Data Retention

Encryption-at-rest

Data Security

Data Backups

Data Deletion / Data Retention

Encryption-at-rest

Data Security

Data Backups

Data Deletion / Data Retention

Encryption-at-rest

Risk Profile

Third Party Dependencies

Yes

Hosting

Major Cloud Provider

Risk Profile

Third Party Dependencies

Yes

Hosting

Major Cloud Provider

Risk Profile

Third Party Dependencies

Yes

Hosting

Major Cloud Provider

Access Control

Bring Your Own Device (BYOD)

Data Access

Access Control

Bring Your Own Device (BYOD)

Data Access

Access Control

Bring Your Own Device (BYOD)

Data Access

App Security

Responsible Disclosure

Application Penetration Testing

Code Analysis

App Security

Responsible Disclosure

Application Penetration Testing

Code Analysis

App Security

Responsible Disclosure

Application Penetration Testing

Code Analysis

Legal

Subprocessors

Cyber Insurance

Data Processing Agreement

Legal

Subprocessors

Cyber Insurance

Data Processing Agreement

Legal

Subprocessors

Cyber Insurance

Data Processing Agreement

Data Privacy

Cookies

Data Breach Notification

Data Privacy Officer

Data Privacy

Cookies

Data Breach Notification

Data Privacy Officer

Data Privacy

Cookies

Data Breach Notification

Data Privacy Officer

Infrastructure

Status Monitoring

All Systems Operational

Azure

BC/DR

Infrastructure

Status Monitoring

All Systems Operational

Azure

BC/DR

Infrastructure

Status Monitoring

All Systems Operational

Azure

BC/DR

Network Security

Data Exfiltration Monitoring

DMARC

Firewall

Network Security

Data Exfiltration Monitoring

DMARC

Firewall

Network Security

Data Exfiltration Monitoring

DMARC

Firewall

Corporate Security

Asset Management Practice

Email Protection

Employee Training

Corporate Security

Asset Management Practice

Email Protection

Employee Training

Corporate Security

Asset Management Practice

Email Protection

Employee Training

Incident Response

Incident Response Plan

Incident Response

Incident Response Plan

Incident Response

Incident Response Plan

Risk Management

Risk Assessment

Supply Chain Risk Management

Risk Management

Risk Assessment

Supply Chain Risk Management

Risk Management

Risk Assessment

Supply Chain Risk Management