§ Trust Center

Assurance, transparency, and controls for Supplier Shield inside Acuna.

This is your due-diligence hub for security posture, compliance evidence, monitoring architecture, and incident-response governance.

Contact security teamRead privacy policy
Audit readiness
Operational

Evidence package available on request

Coverage
24/7

Monitoring and response governance

Frameworks
ISO, NIS2, DORA

Mapped across policy and controls

Hosting posture
Switzerland-first

Regional alignment and resilience

§ 01 · Assurance Documentation

Evidence aligned with procurement and risk review.

Security

AWS Architecture

Cloud architecture overview for Supplier Shield service topology.

Published Mar 17, 2025
Open document
Policies

Business Continuity

Business continuity management program and resilience governance.

Published Oct 22, 2025
Open document
Compliance

Data Protection

Data protection policy is available through the Privacy page.

Published Mar 17, 2025
Open privacy policy
Compliance

EULA

Contractual terms for secure and compliant platform usage.

Published Mar 17, 2025
Open document
Compliance

ISO 27001 Certificate

Security management baseline and governance evidence for stakeholders.

Published Oct 22, 2025
Open document
Policies

Incident Management Procedure

Incident governance, escalation path, and containment response sequence.

Published Jan 21, 2026
Open document
Policies

Information Security Charter

Executive commitments, accountability model, and control ownership.

Published Oct 22, 2025
Open document
Security

Supplier Shield Web Application Penetration Testing

Independent web application penetration test report.

Published Oct 22, 2025
Open document
Security

Vulnerability Management

Vulnerability management policy and remediation governance.

Published Oct 22, 2025
Open document
§ 02 · Control Domains

Continuous controls across application, data, infrastructure, and governance.

Application Security

  • Independent testing
  • Vulnerability management
  • Secure SDLC
  • WAF and runtime controls

Data Security

  • Encryption at rest
  • TLS in transit
  • Access control policy
  • Retention and backup governance

Infrastructure Security

  • Hardened admin access
  • Patch governance
  • Availability-zone resilience
  • Cloud baseline controls

Organization Security

  • Security training
  • Incident response team
  • Business continuity program
  • Role-based accountability
§ 03 · Incident Handling

Structured response lifecycle.

Detect

Signals from monitoring, alerts, and operator reports are triaged immediately.

Assess

Severity, scope, and potential impact are classified with accountable owners.

Contain

Immediate controls reduce spread and protect service availability.

Recover

Systems and workflows are restored with verified integrity checks.

Review

Post-incident lessons and control improvements are documented and tracked.

§ Assurance request

Need a procurement-ready security package for due diligence?

We share scoped evidence based on onboarding stage, risk level, and regulatory requirements.

Request assurance packageReview privacy commitments
Supplier Shield | Trust Center | Supplier Shield