Piscium
Trust

Security & Compliance

We practice what we preach. Piscium's platform and infrastructure are built with the same security rigor we deliver to our customers.

Security Status

Active

All systems operational — continuous monitoring enabled

SOC 2 Type IIISO 27001GDPR

Certifications & Compliance

S

SOC2 Type II

Annual SOC2 Type II audit covering security, availability, and confidentiality trust service criteria.

I

ISO 27001

Information security management system certified to international standards.

G

GDPR Compliant

Full compliance with EU General Data Protection Regulation. Data processing agreements available on request.

Our Security Posture

Enterprise-grade security practices protecting your most critical infrastructure data.

Encryption

All data encrypted in transit (TLS 1.3) and at rest (AES-256). Encryption keys managed via hardware security modules.

Access Control

Role-based access control with mandatory multi-factor authentication. Privileged access reviewed quarterly.

Secure Development

SAST, DAST, and SCA integrated into our CI/CD pipeline. All code reviewed before merge. Dependency updates automated.

Incident Response

Documented incident response plan with defined SLAs. 24/7 security monitoring and on-call rotation.

Penetration Testing

Annual third-party penetration testing with continuous internal validation using our own platform.

Compliance Resources

Guide
NERC CIP Compliance and CTEM: A Practical Guide

How continuous threat exposure management maps to NERC CIP standards CIP-002 through CIP-013.

Read More
Whitepaper
The CTEM ROI Framework: Quantifying Risk Reduction in OT Environments

A practical framework for calculating the return on investment of continuous threat exposure management.

Read More
Whitepaper
OT Security Maturity Model: A 5-Stage Assessment Guide

Assess your organization's OT security maturity across five stages from ad hoc to optimized.

Read More

Have Security Questions?

Our security team is happy to discuss our practices, provide compliance documentation, or answer vendor security questionnaires.