Ceto Logo

Trust Center

Start your security review
View & download sensitive information
Ask for information
ControlK

Welcome to Ceto's Trust Center. Our commitment to data privacy and security is embedded in every part of our business. Use this Trust Center to learn about our security posture and request access to our security documentation.

Documents

REPORTSData Flow Diagram (DFD)
Knowledge Base (FAQ)
  • Do all external network connections terminate on a firewall configured with a 'deny all' rule?
  • Is documentation of the data processing environment including,role of the processor (e.g., data flows, data maps, data inventories, business model etc.) maintained for the systems/products/services that process client scoped data based on data classification.
  • Describe the physical security of the data center or provide a link to the security page of the Cloud Service Provider.
  • Are background checks performed on employees with access to customer data?
  • What type of connection or method of file transfer is used between you and the client? (Leased Line, VPN, MPLS, SFTP, Email, Other)
View more
If you need help using this Trust Center, please contact us.
Contact support
Built onSafeBase by Drata Logo