Compliance with Stellarbridge
Stellarbridge is designed to minimize the compliance work required to operate securely and meet common regulatory and assurance requirements.
This page summarizes key information you may need as you update your policies, procedures, and controls. It is organized by control areas that commonly appear across frameworks (for example SOC 2, HIPAA, and similar programs).
Each section includes:
- A short explanation of how the control area is handled in Stellarbridge
- A Shared Responsibility Table (SRT) describing what you (the customer) are responsible for versus what Stellarbridge is responsible for
Collecting compliance evidence
As part of your compliance program, you will typically collect artifacts and evidence from Stellarbridge to support your own audits and assessments.
Common options include:
- Request third-party audit letters and reports (for example SOC 2 Type II, HIPAA, vulnerability reports). These are available through the Stellarbridge Trust Portal and may require an NDA.
- Submit a security questionnaire. Turnaround is typically same-day (often within hours), and questionnaires can be useful even if you already have formal reports.
To request reports, artifacts, and other evidence, create an account at https://trust.stellarbridge.app. If you are an existing customer, the Trust Portal account is separate from your Stellarbridge application account.
A user guide for the Trust Portal is available here: https://docs.stellarbridge.app/trust-portal/user-manual/.
Table of Contents
- Access Control
- Audit Logging
- Encryption
- Identity and Access Management
- Incident Response
- Physical Security
- Risk Management
- Security Awareness
Access Control
Access control is the process of limiting access to systems and data based on identity and authorization. In Stellarbridge, access control is implemented using roles and permissions (RBAC).
For a full list of roles and permissions, see: https://docs.stellarbridge.app/security/rbac/.
Shared Responsibility Table (SRT)
| Owner | Responsibility |
|---|---|
| Customer | Provision users and service accounts, and assign roles according to least privilege |
| Customer | Review access periodically (for example quarterly) and remove access that is no longer required |
| Customer | Disable or remove users promptly when access is no longer needed (for example termination, role change) |
| Customer | Enforce strong authentication for your users (for example MFA where available) and protect credentials |
| Customer | Protect and rotate API keys and integration secrets, and limit their permissions |
| Stellarbridge | Provide RBAC controls to enforce authorized actions based on configured roles and permissions |
| Stellarbridge | Implement secure authentication, session management, and platform-level authorization enforcement |
| Stellarbridge | Log administrative and security-relevant actions performed in the platform |
| Stellarbridge | Operate and secure the underlying platform and infrastructure that supports access control |
Audit Logging
Audit logging records security-relevant events so you can investigate issues, detect suspicious activity, and demonstrate compliance.
Stellarbridge records platform events and provides customer-accessible audit logs. Customers are expected to integrate these logs into their broader monitoring and retention processes when required.
Shared Responsibility Table (SRT)
| Owner | Responsibility |
|---|---|
| Customer | Review audit logs (and related alerts) for suspicious activity and take action per your incident response process |
| Customer | Export audit logs to your SIEM/log management system when you have monitoring or retention requirements |
| Customer | Control which users can access audit logs within your organization |
| Stellarbridge | Record relevant platform events in a structured format |
| Stellarbridge | Store audit logs in a tamper-resistant manner while within Stellarbridge systems |
| Stellarbridge | Restrict audit log access to authorized users as configured by the customer |
| Stellarbridge | Maintain the logging infrastructure and availability of audit logging features |
NOTE: Stellarbridge retains customer-accessible audit logs for 30 days. If you have regulatory or internal retention requirements beyond that window, export logs and retain them according to your policies.
Refer to the audit log export documentation: https://docs.stellarbridge.app/docs/guides/security/.
Encryption
Encryption protects data in transit and at rest.
- In transit: communications between clients and the platform are encrypted using TLS.
- At rest: data stored by Stellarbridge is encrypted using industry-standard mechanisms.
If your organization requires additional encryption controls (for example customer-managed keys, client-side encryption, or field-level encryption), evaluate whether those requirements can be met by configuration and process, or whether you need supplemental controls outside Stellarbridge.
Shared Responsibility Table (SRT)
| Owner | Responsibility |
|---|---|
| Customer | Classify data and determine whether additional encryption controls are required for your use case |
| Customer | Protect secrets used to access Stellarbridge (API keys, integration credentials, tokens) |
| Customer | Ensure endpoints you control (browsers, devices, networks) are secured so encrypted sessions are not compromised |
| Stellarbridge | Encrypt data in transit using TLS |
| Stellarbridge | Encrypt data at rest within Stellarbridge-managed storage systems |
| Stellarbridge | Manage platform key management processes appropriate to the service design |
| Stellarbridge | Maintain secure cryptographic configurations and update them over time |
Identity and Access Management
Identity and access management (IAM) includes authentication, authorization, and lifecycle processes (joiner/mover/leaver) for people and systems accessing Stellarbridge.
Stellarbridge provides organization-level access controls. You are responsible for your internal identity governance (for example, approvals, offboarding, and identity proofing) and for configuring Stellarbridge to align with your IAM policies.
Shared Responsibility Table (SRT)
| Owner | Responsibility |
|---|---|
| Customer | Define IAM policies (who may have access, approval flows, offboarding timelines, password/MFA requirements) |
| Customer | Maintain your identity provider and user directory hygiene (if you use SSO/IdP integrations) |
| Customer | Ensure users access Stellarbridge from managed and monitored devices/networks where required |
| Stellarbridge | Provide platform authentication mechanisms supported by the service |
| Stellarbridge | Enforce authorization based on roles and permissions configured in the platform |
| Stellarbridge | Provide features that support secure session handling and account security |
Incident Response
Incident response is the process of detecting, investigating, containing, and recovering from security incidents.
Stellarbridge is responsible for responding to incidents that impact the Stellarbridge platform and its underlying infrastructure. You are responsible for responding to incidents within your environment, including compromised user accounts, misconfiguration, or misuse of credentials.
Shared Responsibility Table (SRT)
| Owner | Responsibility |
|---|---|
| Customer | Maintain an incident response plan and runbooks for your organization |
| Customer | Investigate and respond to suspected compromise of your users, devices, credentials, or integrations |
| Customer | Use exported logs and internal telemetry to support investigations and required reporting |
| Stellarbridge | Monitor for and respond to incidents affecting Stellarbridge systems |
| Stellarbridge | Preserve and make available relevant platform-side evidence consistent with contractual and legal requirements |
| Stellarbridge | Communicate security incidents to customers consistent with applicable obligations |
Physical Security
Physical security protects facilities, hardware, and the environment where systems operate.
Stellarbridge relies on physical security controls provided by its sub-processors (for example, cloud hosting providers). A list of sub-processors is available here: https://docs.stellarbridge.app/privacy/3rd-party-processors/.
Shared Responsibility Table (SRT)
| Owner | Responsibility |
|---|---|
| Customer | Secure your physical premises, endpoints, and any networks used to access Stellarbridge |
| Customer | Ensure proper disposal and lifecycle management of devices that access Stellarbridge |
| Stellarbridge | Select and manage sub-processors that provide appropriate physical security controls |
| Stellarbridge | Maintain vendor oversight processes and make relevant documentation available via the Trust Portal |
Risk Management
Risk management includes identifying, assessing, and mitigating risks related to your use of Stellarbridge, as well as ongoing vendor management.
Shared Responsibility Table (SRT)
| Owner | Responsibility |
|---|---|
| Customer | Perform a risk assessment for Stellarbridge aligned to your risk methodology and compliance requirements |
| Customer | Define compensating controls when your risk assessment requires them (for example additional monitoring, DLP, stricter access controls) |
| Customer | Track and re-assess risks periodically or when your usage changes |
| Stellarbridge | Maintain a security program and provide security documentation and evidence (for example audit reports) |
| Stellarbridge | Maintain vulnerability management and security improvement processes for the platform |
Security Awareness
Security awareness ensures that people understand how to handle data securely and recognize common threats such as phishing and social engineering.
Shared Responsibility Table (SRT)
| Owner | Responsibility |
|---|---|
| Customer | Train your workforce on secure use of Stellarbridge (least privilege, MFA, data handling, and phishing awareness) |
| Customer | Establish acceptable use policies and enforce them for all users with access |
| Stellarbridge | Train Stellarbridge personnel and maintain internal security policies and procedures |
| Stellarbridge | Limit and monitor internal access to customer data consistent with the service design and policies |
FAQ: Compliance with Stellarbridge
Q: What compliance standards does Stellarbridge support?
A: Stellarbridge commonly supports customer compliance efforts with:
- SOC 2 Type II
- HIPAA
- FedRAMP Moderate (planned; target 2027)
Availability of reports and the latest status are provided via the Trust Portal.
Q: What is the turnaround time for security questionnaires?
A: Typical turnaround is same-day (often within 6 hours), depending on questionnaire length and complexity.
Q: Can I self-host Stellarbridge to meet compliance requirements?
A: Yes. Self-hosting may be an option for some customers with specific requirements. Because deployment documentation can include sensitive implementation details, access may require an NDA.