Grantable Trust Center
Grantable is in compliance with security best practices, has implemented and is monitoring comprehensive controls, and maintains policies to outline its security procedures.
Compliance
Resources
Controls
Subprocessors
FAQs
Emergency changes that can't follow regular processes due to urgency require immediate attention and discussion with a relevant service manager. Such changes are formally approved retrospectively after implementation. These emergency changes are later reviewed in periodic meetings to analyze lessons learned, root causes, and impacts.
Our organization actively manages vendor risks through a structured approach that includes maintaining a critical third-party vendor inventory and conducting risk assessments before initiating third-party work. These assessments are repeated annually to identify any gaps between third-party security controls and our information security standards.
The organization adheres to the principle of least privilege by granting users access to systems based on role-based schemes, job function, business requirements, or need-to-know basis. Systems are provisioned via a deny-all methodology, meaning users only gain access upon receiving formal independent approval.