Skip to main contentSkip to navigation

SECURITY & TRUST

How Fortress protects customer data

Fortress Cyber is a security platform for MSPs and MSSPs — so the bar for how we handle your data is the same bar you hold the vendors in your Marketplace to. This page documents how we meet it: compliance posture, sub-processors, data handling, access controls, vulnerability disclosure, and incident response.

Last updated: May 2026

Frequently asked questions

Is Fortress Cyber SOC 2 compliant?

[TBD: SOC 2 status — replace with one of: "Fortress is SOC 2 Type II certified as of <date>." | "Fortress is currently in audit for SOC 2 Type II, targeting <quarter year>." | "SOC 2 certification is on our roadmap for <quarter year>; we follow SOC 2 control principles operationally in the meantime."]

Is Fortress Cyber ISO 27001 certified?

[TBD: ISO 27001 status — replace with current state. If not yet pursued, say so plainly: "Not yet pursued. We follow ISO/IEC 27001 control practices operationally."]

Is Fortress Cyber GDPR compliant?

Yes. Fortress Cyber processes customer data in accordance with the EU General Data Protection Regulation. We support data subject access requests, deletion requests, and breach notification within the required timeframes. EU customer data is hosted in EU regions where requested. Contact security@fortresscyber.io for the current Data Processing Agreement.

How does Fortress support NIS2 and DORA compliance for European MSPs?

Fortress' GRC module maps controls to NIS2 and DORA requirements, helping MSPs in scope evidence compliance to auditors. Fortress acts as a processor on customer data and supports the contractual terms NIS2 and DORA require of critical ICT service providers.

Where is customer data stored?

[TBD: data residency — replace with the actual Neon Postgres region(s) you use, e.g.: "Customer data is stored in Neon Postgres in <AWS US East / EU West>. EU-residency is available on request for European customers."]

How is customer data encrypted?

Data is encrypted at rest by Neon (AES-256) and in transit via TLS 1.2+ across all endpoints. The fortresscyber.io domain enforces HTTPS exclusively and is fronted by Cloudflare with HSTS enabled.

What sub-processors does Fortress use?

Fortress relies on the following third parties to operate the Channel Enablement OS: Vercel (frontend and serverless API hosting), Neon (Postgres database), Cloudflare (DNS, WAF, edge protection), Mailtrap (transactional email), PostHog (product analytics), Google (OAuth for customer sign-in where applicable). The current sub-processor list is available on request to security@fortresscyber.io; we provide 30-day notice before adding new sub-processors that process customer data.

Who can access customer data inside Fortress?

Access to customer data is restricted to Fortress employees with a documented operational need, granted under principle of least privilege, and reviewed quarterly. All production access requires MFA, all access is logged, and audit logs are retained for [TBD: retention period — typically 12 months]. We do not sell, share, or use customer data for any purpose other than delivering the Fortress service.

Does Fortress support SSO and MFA?

[TBD: SSO/MFA status — replace with what you actually support today, e.g.: "Fortress requires MFA for all admin accounts and supports SAML SSO via <Okta / Azure AD / Google Workspace> on Business and Enterprise plans."]

How does Fortress respond to security incidents?

Fortress maintains a documented incident response process. Confirmed security incidents are detected via MerlinAI cross-tenant telemetry and our internal monitoring stack. Affected customers are notified within [TBD: SLA — typically 24-72 hours] of confirmed incident classification, with detail, mitigation, and remediation steps. Post-incident reports are shared with affected customers within 14 days.

How do I report a security vulnerability?

Email security@fortresscyber.io with details, reproduction steps, and impact. We acknowledge reports within 2 business days. Researchers acting in good faith are protected from legal action under our safe-harbor terms. See /.well-known/security.txt for the canonical contact and policy URLs.

Does Fortress have a bug bounty program?

[TBD: bug bounty — replace with current state, e.g.: "Not yet. We accept private vulnerability reports via security@fortresscyber.io and acknowledge accepted reports on request." | "Yes — see <bug bounty URL> for scope and reward tiers."]

What is the data retention policy?

[TBD: retention — replace with actuals, e.g.: "Active tenant data is retained for the lifetime of the customer relationship. Upon termination, data is purged within 30 days unless legal hold applies. Audit logs are retained for 12 months. Backup snapshots are retained for 35 days."]

Can I get a Data Processing Agreement (DPA) for GDPR?

Yes. Our standard DPA is available on request to security@fortresscyber.io and is signed pre-contract for all EU customers and any customer processing EU resident data through the platform.

Security questions, vulnerability reports, or DPA requests

Email security@fortresscyber.io — we acknowledge within 2 business days. Researchers acting in good faith are protected under our safe-harbor terms.

Canonical vulnerability-disclosure policy: /.well-known/security.txt