Cremit logoCremit

Cremit Trust Center

At Cremit, security isn't just a feature—it's foundational to everything we build. As a company dedicated to protecting Non-Human Identities, we hold ourselves to the highest security standards, because we believe you can't secure what you don't practice. We treat the data entrusted to us—whether from our customers, their end users, or anyone who interacts with our organization—with the utmost care and responsibility. Our security-first mindset drives our development processes, infrastructure decisions, and organizational policies. We are committed to transparency in how we operate and continuously improving our security posture. This includes maintaining industry-recognized certifications, conducting regular third-party security assessments, and fostering a culture where every team member takes ownership of security.

Compliance

Resources

Physical Security Policy
Acceptable Use Policy
Network Security Policy
Business Continuity and Disaster Recovery
Business Impact Assessment Policy

Controls

Access review of infrastructure
Physical access control systems
VPN access
Multifactor authentication
User list with assigned roles and privileges
Encryption of data
Backup and recovery policy
Source code tool
Web application firewall
Vulnerability scanning
Sample code changes
Business continuity and disaster recovery testing
Intrusion detection tool
Infrastructure baseline hardening policy
SSL/TLS certificates for infrastructure
Monitoring, measurement, analysis and evaluation
Monitoring tool
Alerts and remediation
Breach notification communication
Security incident list
Log management tool
Vendor management program
Vendor onboarding
Vendor termination
Vendor list
Employee handbook
Existing employee and contractor agreements
List of active employees & contractors as on date
Security awareness training implemented
List of newly hired employees & contractors
Multi-availability zones
Asset register maintaining
Risk and Governance Executive Committee meeting minutes
Risk management program
Patch management
Antivirus and malware configurations
Customer termination
Asset register list
Termination checklist

Subprocessors

HubSpot | Software & Tools for your Business - Homepage
HubSpot | Software & Tools for your Business - HomepageUnknown Category
Notion
NotionBusiness Apps & Productivity
GitHub
GitHubCode & Build Security
Jamf Apple Device Management. Mac iPad iPhone TV Apple MDM
Jamf Apple Device Management. Mac iPad iPhone TV Apple MDMUnknown Category