Skip to main content
Last reviewed: March 5, 2026 Owner: Security + Engineering Review cadence: Quarterly Status: Reference Use this page as the index for questionnaire completion. It maps common prompts to the right trust pages without requiring deep navigation.

How to use this map

  1. Find the closest questionnaire topic.
  2. Start with the listed primary page.
  3. Use the secondary page only if the reviewer asks for more depth.

Architecture and boundaries

Questionnaire topicPrimary pageSecondary page
Architecture and trust boundariesSecurity ArchitectureShared Responsibility
Hosted vs self-hosted ownershipShared ResponsibilityOverview
Tenant isolation and logical separationSecurity ArchitectureIdentity and Access
Encryption in transit and at restEncryption StandardEncryption and Key Management
Key management and key rotationEncryption and Key ManagementEncryption Standard

Identity and access

Questionnaire topicPrimary pageSecondary page
API identity and token controlsIdentity and AccessShared Responsibility
Login and SSO protocol supportAuthentication and Password StandardIdentity and Access
Automated user provisioning and deprovisioningAuthentication and Password StandardIdentity and Access
Inactive account disablement after inactivityAuthentication and Password StandardIdentity and Access
Session timeout and reauthentication controlsAuthentication and Password StandardIdentity and Access
Device or IP-based session restrictionsAuthentication and Password StandardNetwork Security

Data governance

Questionnaire topicPrimary pageSecondary page
Data handling scope and stored dataData HandlingOverview
Subprocessors and third-party servicesSubprocessors and Third PartiesShared Responsibility
Integration directionality and connectivity modelNetwork SecuritySecurity Architecture
Material change notice (security, availability, or data handling)Subprocessors and Third PartiesCompliance and Assurance

Cloud operations

Questionnaire topicPrimary pageSecondary page
Cloud services policy and baseline requirementsCloud Services Security StandardNetwork Security
Cloud security alert monitoringIncident ResponseCloud Services Security Standard

AI and model governance

Questionnaire topicPrimary pageSecondary page
AI provider handling and deployment optionsAI Data ControlsOverview
Questionnaire topicPrimary pageSecondary page
Compliance status and current assurancesCompliance and AssuranceDocuments and Requests

How we answer in-progress controls

When a control is not fully complete, we answer with:
  • current implementation status,
  • compensating controls currently in place,
  • target completion timing,
  • and where evidence will be provided when complete.

Need a full review packet?

Email with your checklist and timeline. We can provide additional evidence under NDA.