Security & Compliance

Our commitment to
security, privacy,
and trust.

ResolvX is built on the premise that financial dispute resolution requires the highest standards of data protection. This page documents how we protect your data, our control environment, and our path to independent certification.

ISO 27001:2022 : Aligned
SOC 2 Type II : In Progress
GDPR : Aligned
NIST CSF 2.0 : Aligned
NIST SP 800-61 : Implemented
22/26
ISO 27001 Controls Conformant
6/6
Tier 1 Vendors Assessed
100%
MFA Enforced
Across All Systems
0
Major Nonconformities
(Q1 2026 Audit)
Last updated: March 2026

Document Library

ResolvX is proud to showcase its six-phase GRC programme. Public documents link directly to the project repository.
Confidential documents require a signed NDA - request access via security@resolvx.io.

23 documents
Phase 1 Programme Foundation
📄
Programme Charter & Scope Definition
Objectives, scope, risk methodology, stakeholder register, programme roadmap
MD ● Public View Document →
🏠
Company Profile & Asset Inventory
ResolvX background, asset classification, information types, cloud environments
MD ● Public View Document →
Phase 2 Risk & Controls
📈🔒
Risk Register
25 risks across 5 domains : likelihood, impact, residual scores, heat map, treatment plan
XLSX 🔒 Confidential · NDA Request Access
📄🔒
Risk Summary Report
Risk posture overview, top residual risks, FAIR analysis, risk treatment plan, board recommendations
PDF 🔒 Confidential · NDA Request Access
📄
Risk Methodology
Description of the approach and techniques used for risk assessment and management
PDF● PublicView Document →
📋
ISO 27001:2022 Control Matrix
Full Annex A mapping - 93 controls, implementation status, control owners
XLSX ● Public View Document →
📋
SOC 2 TSC Criteria Mapping
CC1 - CC9 mapped against implemented controls, evidence references, gaps noted
XLSX ● Public View Document →
📊
NIST CSF 2.0 Function Mapping
GV, ID, PR, DE, RS, RC functions mapped to ResolvX controls
XLSX ● Public View Document →
Phase 3 Policies & Vendor Risk
📄
Information Security Policy (POL-001)
ISMS framework, objectives, risk appetite, control obligations - v1.0 Board Approved
PDF● PublicView Document →
📄
Acceptable Use Policy (POL-002)
Device use, remote work, data handling, AUP enforcement and disciplinary framework
PDF● PublicView Document →
📄
Access Control Policy (POL-003)
RBAC, MFA requirements, JML lifecycle, privileged access management, review cadence
PDF● PublicView Document →
📄
Data Classification Policy (POL-004)
4-tier scheme - Public, Internal, Confidential, Restricted - with handling rules per category
PDF● PublicView Document →
📄
Vendor Management Policy (POL-005)
TPRM framework, vendor tiering criteria, DPA requirements, SSO enforcement, review cadence
PDF● PublicView Document →
📄
Privacy Programme Policy (POL-006)
ROPA, DSR process, GDPR Art.30/33/34 obligations, controller vs processor distinctions
PDF● PublicView Document →
📈🔒
Vendor Register & Tier 1 Assessments
14 vendors · 6 Tier 1 fully assessed with scoring · residual risk ratings
XLSX 🔒 Confidential · NDA Request Access
📂🔒
Sub-Processor Register
10 sub-processors · transfer mechanisms, SCC status, data scope, DPA references
XLSX 🔒 Confidential · NDA Request Access
Phase 4 Incident Response
🚨
Incident Response Plan (IRP)
Full NIST 800-61 lifecycle with roles, severity model, containment, regulatory notifications
PDF ● Public View Document →
🎮
Operational Runbooks : Phishing, Ransomware, Data Breach
3 playbooks covering detection through post-incident review and lessons learned
MD ● Public View Document →
📋🔒
Tabletop Exercise Report : Operation Locked Gate
Feb 2026 · 8 participants · ransomware scenario · findings and remediation tracking
PDF 🔒 Confidential · NDA Request Access
Phase 5 Audit Readiness
📋🔒
Internal Audit Checklist
31 ISO 27001 controls + 17 SOC 2 TSC criteria tested - detailed test results and evidence reviewed
XLSX 🔒 Confidential · NDA Request Access
📄🔒
Internal Audit Report
Q1 2026 · Satisfactory verdict · 0 major NCs · 5 minor NCs · 3 observations with root cause
PDF 🔒 Confidential · NDA Request Access
🎯🔒
SOC 2 Type II Readiness Assessment
88% readiness · Substantially Ready · gap details · observation period target Aug 2026
PDF 🔒 Confidential · NDA Request Access
📈🔒
Corrective Action Plan
8 actions · root cause, owner, due date, verification method · Q2 2026 remediation target
XLSX 🔒 Confidential · NDA Request Access
Phase 6 Trust Center & Dashboard
📊🔒
Compliance Dashboard
5-sheet internal CISO dashboard · programme status, risk overview, vendor, CAP, 2026 roadmap
XLSX 🔒 Confidential · NDA Request Access
🌐
Trust Center
Public-facing security posture, compliance status, document library, vendor security
● Public

How we protect your data

Our security programme is built across six phases, grounded in ISO 27001:2022, NIST CSF 2.0, and SOC 2 Trust Service Criteria.

🔐

Identity & Access Control

Multi-factor authentication is enforced for 100% of users via Okta. Role-based access control with quarterly access reviews. Privileged accounts require hardware FIDO2 keys. Zero standing access to production data.

Implemented
☁️

Cloud Infrastructure Security

Hosted exclusively on AWS in EU regions (eu-west-1, eu-central-1). AWS GuardDuty active in all regions. CloudTrail logging with S3 integrity validation. All data encrypted at rest (AES-256) and in transit (TLS 1.3).

Implemented
🔍

Vulnerability Management

Snyk integrated into all CI/CD pipelines for SAST and SCA scanning. Patch SLAs: Critical within 24 hours, High within 72 hours, Medium within 30 days. AWS Inspector enabled. No unpatched critical vulnerabilities.

Implemented
📊

Monitoring & Detection

24/7 infrastructure monitoring via Datadog. GuardDuty threat detection with weekly findings review. Okta anomaly detection with impossible travel alerts. Centralised log management with 12-month retention.

Implemented

Standards and certifications

We align our ISMS to leading international standards. Our Q1 2026 internal audit confirmed conformance across all tested controls.

Framework Scope Status Evidence Last Assessed
ISO/IEC 27001:2022 Full ISMS. Across all systems, data, and personnel Aligned Internal audit Q1 2026 ·
0 major NCs
Mar 2026
SOC 2 Trust Service Criteria Security, Availability, Confidentiality Type II In Progress Readiness: 88% · Observation period Aug 2026 Mar 2026
GDPR (EU) 2016/679 All personal data processing activities Compliant ROPA maintained · DPAs executed · DSR process live Mar 2026
NIST CSF 2.0 GV, ID, PR, DE, RS, RC functions Aligned Control matrix mapped · Gap analysis complete Q4 2025
NIST SP 800 - 61 Rev 2 Incident response lifecycle Implemented IR plan, 3 runbooks, tabletop Feb 2026 Feb 2026
NIST SP 800 - 53B (Moderate Baseline) Control selection reference Reference Used as supplementary control baseline Q4 2025

ISO 27001:2022 - Key Controls 22 Conformant

A5.1 Information Security Policies
A5.15 Access Control
A5.16 Identity Management
A5.19 Information Security in Supplier Relationships
A5.24 - A5.27 Incident Response Lifecycle
A5.34 Privacy and Protection of PII
A8.5 Secure Authentication (MFA)
A8.15 Logging / A8.16 Monitoring
A8.24 Use of Cryptography
A8.28 Secure Coding

SOC 2 TSC - Ready Families 7 / 9 Full

CC1 Control Environment
CC3 Risk Assessment
CC4 Monitoring of Controls
CC5 Control Activities
CC6 Logical and Physical Access
CC7 System Operations
CC8 Change Management
CC9 Risk Mitigation - Vendor
CC2 Communication & InformationTraining gap - Q2 2026

How we handle your data

We process financial dispute data on behalf of regulated financial institutions. Our data handling practices reflect the sensitivity of this responsibility.

📍 Data Residency

  • All production data stored exclusively in AWS EU regions (eu-west-1, eu-central-1)
  • Data residency settings enforced in Google Workspace (EU)
  • No data transferred outside EEA without explicit contract provision and SCCs
  • Sub-processor transfer mechanisms documented (SCCs executed with all US sub-processors)

🔒 Encryption

  • AES-256 encryption at rest across all production databases and S3 buckets
  • TLS 1.3 enforced on all public endpoints - no legacy protocols permitted
  • AWS KMS for encryption key management with defined key rotation
  • 1Password zero-knowledge architecture for credential storage

⏱️ Retention and Deletion

  • Data retention periods defined per data category in our Data Classification Policy
  • Client data deleted or returned within 30 days of contract termination
  • Data Subject Requests (access, deletion, portability) handled within statutory timelines
  • Automated deletion workflows implemented for defined categories

👥 Access to Data

  • Strict need-to-know access - no employee has broad access to client data
  • All access to production data requires justification and time-limited approval
  • Quarterly access reviews by system owners; deprovisioning SLA of 48 hours
  • All access is logged and monitored via CloudTrail and Okta audit logs

📋 GDPR Obligations

  • ResolvX acts as data processor for client financial data; data controller for employee data
  • Data Processing Agreements (DPAs) executed with all clients and data-processing vendors
  • Record of Processing Activities (ROPA) maintained under GDPR Article 30
  • 72-hour breach notification to supervisory authority (Irish DPC) - documented process

📂 Sub-processors

  • Current sub-processor register maintained and available on request
  • 30-day advance notice to clients before adding or replacing material sub-processors
  • All sub-processors assessed against our vendor risk tiering framework
  • Key sub-processors: AWS (hosting), Google Workspace (collaboration), Okta (identity)

How we respond to security incidents

ResolvX maintains a documented, tested incident response programme aligned to NIST SP 800-61 Rev 2. Our last tabletop exercise was conducted in February 2026.

Detection & Declaration T+0

Incidents detected via AWS GuardDuty, Datadog, Okta anomaly detection, or staff reports. Severity classified P1–P4 within minutes of detection.

Containment P1: 15 min

Incident Response Team assembled. Affected systems isolated. Evidence preserved per chain-of-custody procedures. Out-of-band communications activated.

Client & Regulatory Notification

If your data is affected, we notify you as data controller within our DPA timelines (typically 24–72 hours). Personal data breaches notified to the Irish DPC within 72 hours of awareness.

Eradication & Recovery P1 RTO: 4hr

Root cause remediated. Systems restored from verified clean backups. Service restored per defined RTOs. 72-hour post-recovery monitoring.

Post-Incident Review

Lessons learned meeting within 5 business days of all P1/P2 incidents. Findings fed back into risk register and control improvements.

Response SLAs

Severity Initial Response Client Notification
P1 : Critical 15 minutes Within 24 hours
P2 : High 1 hour Within 48 hours
P3 : Medium 4 hours As required
P4 : Low Next business day N/A

To report a suspected security incident: security@resolvx.io
For urgent P1 issues, your account manager has our emergency contact line.

Our third-party risk programme

We operate a formal Third-Party Risk Management (TPRM) framework. All critical vendors are assessed annually. Data Processing Agreements are executed with every vendor that processes personal data.

Vendor Role Risk Tier SOC 2 / ISO 27001 DPA Status Data Processed
Amazon Web Services (AWS) Cloud Infrastructure Tier 1 SOC 2 Type II · ISO 27001 Active All production data
(EU regions)
Okta Identity & Access Management Tier 1 SOC 2 Type II Active Employee identity
(no client PII)
GitHub Source Code Management Tier 1 SOC 2 Type II · ISO 27001 (Microsoft) Active Source code only
(no client data)
Google Workspace Email & Collaboration
(EU residency)
Tier 1 SOC 2 Type II · ISO 27001 Active Internal comms
(EU data residency)
Datadog Monitoring & Observability Tier 2 SOC 2 Type II Active System logs (anonymised)
Stripe Payment Processing
(billing only)
Tier 2 PCI DSS Lvl 1 · SOC 2 Type II Active ResolvX billing only
(no client data)

Full sub-processor register available to clients upon request under NDA. Updated within 30 days of any material change.

Have security questions?

Our GRC team is available to answer questions about our security programme, share additional documentation under NDA, or schedule a security review call.