The technical and organizational measures NEXDESK uses to protect customer infrastructure and data, plus the audit reports and certifications that back them up.
trust@nexdesk.com with your account ID and the NDA you'd like us to sign.processors@nexdesk.com.If you find a vulnerability in NEXDESK infrastructure, please report it. We commit to acknowledge within 24 h, triage within 72 h, and not take legal action against good-faith research that follows our policy.
security@nexdesk.com (PGP key fingerprint published in nexdesk.com/.well-known/security.txt)nexdesk.com/security/vdpnexdesk.com/security/thanks| Framework | Status | Evidence |
|---|---|---|
| SOC 2 Type II (Trust Services Criteria) | Continuous | Auditor report, available under NDA |
| ISO/IEC 27001:2022 | Certified | Certificate + Statement of Applicability |
| ISO/IEC 27017 | Certified | Cloud-services controls |
| ISO/IEC 27018 | Certified | PII in public clouds |
| PCI DSS v4.0 | Service Provider Level 1 | AoC, available under NDA |
| HIPAA / HITECH | BAA available | Eligible regions: DAL, ASH, FRA, SGP |
| GDPR / UK GDPR | Compliant | DPA + SCCs + UK IDTA |
| CCPA / CPRA | Compliant | Service-provider terms |
| FedRAMP | In progress (Moderate) | Authorization expected 2027-Q1 |
| CSA STAR Level 2 | Submitted | CAIQ on request |
Need something else? Send the questionnaire to trust@nexdesk.com and we'll usually return it within 5 business days.