Trust Center
Overview
CIVAC is the German compliance workspace for every appointed officer role companies above the relevant thresholds must designate. Customers license the workspace for their internal officers, or appoint ours under Officer-as-a-Service. The same platform, the same audit trail, the same evidence inspectors recognise. EU-only data residency, append-only audit logs, AI outputs that are source-cited and confidence-scored.
RequestCompliance
Frameworks we operate to, in production or in active certification.
Security
EU Data Residency
All customer data is processed and stored exclusively in the EU (Frankfurt). No transfers outside the EEA without an Article 46 GDPR mechanism.
Encryption Everywhere
TLS 1.3 in transit, AES-256 at rest. Customer-specific KMS keys for documents on the appointed-officer plan.
Append-Only Audit Trail
Every action by every user creates an immutable evidence record. Exportable in formats inspectors recognise.
Least-Privilege Access
Role-based access by default, mandatory MFA for admins, SSO/SAML available, quarterly access reviews.
Resilient Infrastructure
Multi-AZ deployment, hourly backups with 30-day point-in-time recovery, disaster-recovery runbooks tested twice a year.
Responsible AI
No model training on customer data. AI outputs are source-cited and confidence-scored. Prompts and documents are never shared between tenants.
Resources
What we publish, what we share under NDA, what your officers can hand to auditors.
Policies
+ 6 more on requestPOL-01Information Security PolicyPOL-04Acceptable Use PolicyPOL-07Access Control PolicyPOL-09Cryptography PolicyPOL-12Data Protection Policy (GDPR)POL-15Incident Response PolicyPOL-18Business Continuity & DR PolicyPOL-21Vendor & Sub-Processor PolicyPOL-24AI Acceptable Use PolicyPOL-27Records of Processing Activities
Reports & Templates
- RequestData Processing Agreement (Art. 28 GDPR)Customer-ready DPA template including SCCs and the current sub-processor list.
- RequestSecurity WhitepaperArchitecture, encryption, access management, incident response and BC in one document.
- RequestPenetration Test SummaryIndependent third-party assessment. Executive summary without NDA, full report under NDA.
- RequestRecords of Processing Activities (Art. 30)Internal RoPA template that mirrors what your DPO will hand to the regulator.
Subprocessors
Companies we engage to deliver the service. Customers are notified at least 30 days before any change.
- Google Cloud PlatformGermany (Frankfurt region)
- CloudflareEU edge nodes
- AnthropicEU regional endpoints
- StripeIreland
Controls
We operate to ISO/IEC 27001:2022 Annex A. Excerpt of the controls in scope, grouped by clause.
Organisational
- A.5.1Policies for information security
- A.5.9Inventory of information and other associated assets
- A.5.15Access control
- A.5.16Identity management
- A.5.22Monitoring, review and change management of supplier services
- A.5.29Information security during disruption
- A.5.31Legal, statutory, regulatory and contractual requirements
- A.5.34Privacy and protection of personal data
Technological
- A.8.5Secure authentication
- A.8.8Management of technical vulnerabilities
- A.8.18Use of privileged utility programs
- A.8.24Use of cryptography
- A.8.26Application security requirements
- A.8.28Secure coding
- A.8.29Security testing in development and acceptance
- A.8.34Protection of information systems during audit testing
Physical
- A.7.2Physical entry
- A.7.4Physical security monitoring
- A.7.5Protecting against physical and environmental threats
- A.7.7Clear desk and clear screen
- A.7.8Equipment siting and protection
- A.7.12Cabling security
People
- A.6.1Screening
- A.6.3Information security awareness, education and training
- A.6.4Disciplinary process
- A.6.5Responsibilities after termination or change of employment
- A.6.6Confidentiality or non-disclosure agreements
- A.6.8Information security event reporting