Trust Center

Start your security review
View & download sensitive information
Ask for information
Search items
ControlK

Overview

Welcome to the ProjectDiscovery Trust Center, where our unwavering commitment to cybersecurity and data privacy is evident in every aspect of our business. Here, you can learn about our security posture and request access to our security documentation.

The Trust Center is a hub for information about our security practices, policies, and procedures, as well as details about how we protect your data and comply with relevant regulations. You can also request access to additional security documentation, such as our security audit reports and penetration testing results.

We have designed the Trust Center to be a transparent and accessible resource for our customers and partners, so that they can have confidence in our commitment to security and privacy. We invite you to request access to the Trust Center and discover how we are working to protect your data and build trust in our services.

Compliance

SOC 2 Logo
SOC 2
Start your security review
View & download sensitive information
Ask for information

ProjectDiscovery is reviewed and trusted by

Prescient Assurance-company-logoPrescient Assurance
SafeBase-company-logoSafeBase

Documents

Pentest Report
SOC 2
Cyber Insurance
Acceptable Use Policy
Asset Management Policy
Backup Policy
Business Continuity Policy
Data Classification Policy
Encryption Policy
General Incident Response Policy
Information Security Policy
Password Policy
Physical Security
Software Development Lifecycle
Vulnerability Management Policy
Data Processing Addendum

Risk Profile

Critical DependenceNo
Third Party DependenceNo
HostingMajor Cloud Provider

Product Security

Multi-Factor Authentication
SSO Support

Reports

Pentest Report
SOC 2 Report

Data Security

We follow industry best practices for data security. We are happy to provide more details about our data security practices upon request.

App Security

Code Analysis
Credential Management
View more

Data Privacy

Cookies

Access Control

Access is tightly monitored and controlled at our company. We are happy to provide more details about our access control practices upon request.

Infrastructure

Endpoint Security

We follow industry best practices for endpoint security. We are happy to provide more details about our endpoint security practices upon request.

Network Security

We protect our corporate network against external & internal threats.

Corporate Security

Asset Management Practices
Employee Training
HR Security
View more

Policies

Acceptable Use Policy
Asset Management Policy
Backup Policy
View more

If you need help using this Trust Center, please contact our Cybersecurity Risk team.

If you think you may have discovered a vulnerability, please send us a note.

Powered bySafeBase Logo