Compliance with Stellarbridge

Stellarbridge is designed to minimize the compliance work required to operate securely and meet common regulatory and assurance requirements.

This page summarizes key information you may need as you update your policies, procedures, and controls. It is organized by control areas that commonly appear across frameworks (for example SOC 2, HIPAA, and similar programs).

Each section includes:

  • A short explanation of how the control area is handled in Stellarbridge
  • A Shared Responsibility Table (SRT) describing what you (the customer) are responsible for versus what Stellarbridge is responsible for

Collecting compliance evidence

As part of your compliance program, you will typically collect artifacts and evidence from Stellarbridge to support your own audits and assessments.

Common options include:

  1. Request third-party audit letters and reports (for example SOC 2 Type II, HIPAA, vulnerability reports). These are available through the Stellarbridge Trust Portal and may require an NDA.
  2. Submit a security questionnaire. Turnaround is typically same-day (often within hours), and questionnaires can be useful even if you already have formal reports.

To request reports, artifacts, and other evidence, create an account at https://trust.stellarbridge.app. If you are an existing customer, the Trust Portal account is separate from your Stellarbridge application account.

A user guide for the Trust Portal is available here: https://docs.stellarbridge.app/trust-portal/user-manual/.

Table of Contents


Access Control

Access control is the process of limiting access to systems and data based on identity and authorization. In Stellarbridge, access control is implemented using roles and permissions (RBAC).

For a full list of roles and permissions, see: https://docs.stellarbridge.app/security/rbac/.

Shared Responsibility Table (SRT)

OwnerResponsibility
CustomerProvision users and service accounts, and assign roles according to least privilege
CustomerReview access periodically (for example quarterly) and remove access that is no longer required
CustomerDisable or remove users promptly when access is no longer needed (for example termination, role change)
CustomerEnforce strong authentication for your users (for example MFA where available) and protect credentials
CustomerProtect and rotate API keys and integration secrets, and limit their permissions
StellarbridgeProvide RBAC controls to enforce authorized actions based on configured roles and permissions
StellarbridgeImplement secure authentication, session management, and platform-level authorization enforcement
StellarbridgeLog administrative and security-relevant actions performed in the platform
StellarbridgeOperate and secure the underlying platform and infrastructure that supports access control

Audit Logging

Audit logging records security-relevant events so you can investigate issues, detect suspicious activity, and demonstrate compliance.

Stellarbridge records platform events and provides customer-accessible audit logs. Customers are expected to integrate these logs into their broader monitoring and retention processes when required.

Shared Responsibility Table (SRT)

OwnerResponsibility
CustomerReview audit logs (and related alerts) for suspicious activity and take action per your incident response process
CustomerExport audit logs to your SIEM/log management system when you have monitoring or retention requirements
CustomerControl which users can access audit logs within your organization
StellarbridgeRecord relevant platform events in a structured format
StellarbridgeStore audit logs in a tamper-resistant manner while within Stellarbridge systems
StellarbridgeRestrict audit log access to authorized users as configured by the customer
StellarbridgeMaintain the logging infrastructure and availability of audit logging features

NOTE: Stellarbridge retains customer-accessible audit logs for 30 days. If you have regulatory or internal retention requirements beyond that window, export logs and retain them according to your policies.

Refer to the audit log export documentation: https://docs.stellarbridge.app/docs/guides/security/.


Encryption

Encryption protects data in transit and at rest.

  • In transit: communications between clients and the platform are encrypted using TLS.
  • At rest: data stored by Stellarbridge is encrypted using industry-standard mechanisms.

If your organization requires additional encryption controls (for example customer-managed keys, client-side encryption, or field-level encryption), evaluate whether those requirements can be met by configuration and process, or whether you need supplemental controls outside Stellarbridge.

Shared Responsibility Table (SRT)

OwnerResponsibility
CustomerClassify data and determine whether additional encryption controls are required for your use case
CustomerProtect secrets used to access Stellarbridge (API keys, integration credentials, tokens)
CustomerEnsure endpoints you control (browsers, devices, networks) are secured so encrypted sessions are not compromised
StellarbridgeEncrypt data in transit using TLS
StellarbridgeEncrypt data at rest within Stellarbridge-managed storage systems
StellarbridgeManage platform key management processes appropriate to the service design
StellarbridgeMaintain secure cryptographic configurations and update them over time

Identity and Access Management

Identity and access management (IAM) includes authentication, authorization, and lifecycle processes (joiner/mover/leaver) for people and systems accessing Stellarbridge.

Stellarbridge provides organization-level access controls. You are responsible for your internal identity governance (for example, approvals, offboarding, and identity proofing) and for configuring Stellarbridge to align with your IAM policies.

Shared Responsibility Table (SRT)

OwnerResponsibility
CustomerDefine IAM policies (who may have access, approval flows, offboarding timelines, password/MFA requirements)
CustomerMaintain your identity provider and user directory hygiene (if you use SSO/IdP integrations)
CustomerEnsure users access Stellarbridge from managed and monitored devices/networks where required
StellarbridgeProvide platform authentication mechanisms supported by the service
StellarbridgeEnforce authorization based on roles and permissions configured in the platform
StellarbridgeProvide features that support secure session handling and account security

Incident Response

Incident response is the process of detecting, investigating, containing, and recovering from security incidents.

Stellarbridge is responsible for responding to incidents that impact the Stellarbridge platform and its underlying infrastructure. You are responsible for responding to incidents within your environment, including compromised user accounts, misconfiguration, or misuse of credentials.

Shared Responsibility Table (SRT)

OwnerResponsibility
CustomerMaintain an incident response plan and runbooks for your organization
CustomerInvestigate and respond to suspected compromise of your users, devices, credentials, or integrations
CustomerUse exported logs and internal telemetry to support investigations and required reporting
StellarbridgeMonitor for and respond to incidents affecting Stellarbridge systems
StellarbridgePreserve and make available relevant platform-side evidence consistent with contractual and legal requirements
StellarbridgeCommunicate security incidents to customers consistent with applicable obligations

Physical Security

Physical security protects facilities, hardware, and the environment where systems operate.

Stellarbridge relies on physical security controls provided by its sub-processors (for example, cloud hosting providers). A list of sub-processors is available here: https://docs.stellarbridge.app/privacy/3rd-party-processors/.

Shared Responsibility Table (SRT)

OwnerResponsibility
CustomerSecure your physical premises, endpoints, and any networks used to access Stellarbridge
CustomerEnsure proper disposal and lifecycle management of devices that access Stellarbridge
StellarbridgeSelect and manage sub-processors that provide appropriate physical security controls
StellarbridgeMaintain vendor oversight processes and make relevant documentation available via the Trust Portal

Risk Management

Risk management includes identifying, assessing, and mitigating risks related to your use of Stellarbridge, as well as ongoing vendor management.

Shared Responsibility Table (SRT)

OwnerResponsibility
CustomerPerform a risk assessment for Stellarbridge aligned to your risk methodology and compliance requirements
CustomerDefine compensating controls when your risk assessment requires them (for example additional monitoring, DLP, stricter access controls)
CustomerTrack and re-assess risks periodically or when your usage changes
StellarbridgeMaintain a security program and provide security documentation and evidence (for example audit reports)
StellarbridgeMaintain vulnerability management and security improvement processes for the platform

Security Awareness

Security awareness ensures that people understand how to handle data securely and recognize common threats such as phishing and social engineering.

Shared Responsibility Table (SRT)

OwnerResponsibility
CustomerTrain your workforce on secure use of Stellarbridge (least privilege, MFA, data handling, and phishing awareness)
CustomerEstablish acceptable use policies and enforce them for all users with access
StellarbridgeTrain Stellarbridge personnel and maintain internal security policies and procedures
StellarbridgeLimit and monitor internal access to customer data consistent with the service design and policies

FAQ: Compliance with Stellarbridge

Q: What compliance standards does Stellarbridge support?

A: Stellarbridge commonly supports customer compliance efforts with:

  1. SOC 2 Type II
  2. HIPAA
  3. FedRAMP Moderate (planned; target 2027)

Availability of reports and the latest status are provided via the Trust Portal.

Q: What is the turnaround time for security questionnaires?

A: Typical turnaround is same-day (often within 6 hours), depending on questionnaire length and complexity.

Q: Can I self-host Stellarbridge to meet compliance requirements?

A: Yes. Self-hosting may be an option for some customers with specific requirements. Because deployment documentation can include sensitive implementation details, access may require an NDA.