Security information is communicated to external parties
Customers, regulators, and other external parties need relevant security information to make decisions about working with you. This includes your security commitments in contracts and terms of service, how you notify customers of incidents that affect them, how you handle vulnerability disclosures from external researchers, and how you communicate with regulators. Failure to communicate externally when required creates legal and reputational risk.
Implementation steps
- 1
Publish a security or trust page
Create a public-facing page (a trust center or security page) that describes your security practices, certifications, and commitments. This is increasingly expected by enterprise buyers and reduces repetitive questionnaire work. Include: certifications held, key controls summary, data handling practices, and contact for security questions.
vanta drata secureframe notion webflow - 2
Define and publish a vulnerability disclosure policy
Document how external security researchers can report vulnerabilities to you and what they can expect in return. A responsible disclosure or bug bounty policy tells researchers you welcome reports and reduces the chance of public disclosure before you can fix an issue. Publish it at a standard location (security.txt or your website).
hackerone bugcrowd google-forms - 3
Establish a customer breach notification process
Document the process for notifying customers if a security incident affects their data. Define: who approves notifications, what the notification must contain, what the timeline is (typically 72 hours for GDPR-covered entities), and what communication channel is used. Test the process before you need it.
statuspage pagerduty email
Evidence required
Public security page or trust center
A publicly accessible page describing your security practices.
- - Trust center URL with SOC 2 report request process
- - Security page on company website with key controls described
- - Vanta or Drata trust page
Vulnerability disclosure policy
A published policy explaining how to report vulnerabilities.
- - security.txt file at well-known URL
- - Bug bounty program on HackerOne or Bugcrowd
- - Responsible disclosure page on company website
Breach notification procedure
A documented process for notifying customers and regulators of security incidents.
- - Incident response plan with customer notification section
- - Data breach notification template
- - Contractual SLA for breach notification timing
Related controls
Security information is communicated internally
Communication and Information
Relevant security information is obtained and used
Communication and Information
Commitment to integrity and ethical values is demonstrated
Control Environment
Board or equivalent body oversees security risk
Control Environment