Your security is our top priority. Learn how we protect your data and maintain the highest security standards.
At TigerTrust, security isn't just a feature—it's the foundation of everything we do. As a certificate lifecycle management platform trusted by Fortune 500 companies, we understand the critical importance of protecting your infrastructure and data.
We implement defense-in-depth security strategies, conduct regular third-party audits, and maintain certifications from leading security frameworks to ensure your data is protected at every layer.
Multi-layered security controls to protect your certificates and infrastructure
Independently verified security and compliance standards
Annual third-party audit of security, availability, and confidentiality controls
International standard for information security management systems
Full compliance with EU General Data Protection Regulation
Payment Card Industry Data Security Standard compliance
Business Associate Agreement (BAA) available for healthcare customers
Federal Risk and Authorization Management Program
We maintain a comprehensive incident response program to quickly detect, respond to, and recover from security events.
We welcome reports from security researchers and maintain a bug bounty program. If you discover a security vulnerability, please report it to:
security@tigertrust.io
PGP Key: Download Public Key
Recommendations to maximize your security posture
Require MFA for all users and integrate with your SSO provider for centralized access control.
Use RBAC to grant users only the permissions they need. Regularly review and audit access rights.
Review audit logs for unusual activity and integrate with your SIEM for comprehensive monitoring.
Set up automated alerts for certificate expiration and policy violations to prevent outages.
Rotate API keys regularly, store them securely, and never commit them to version control.
Our security team is here to answer your questions and provide additional documentation
Email: security@tigertrust.io