Overview
Welcome to Stord's Security Portal. Our goal at Stord is to align overall business objectives with the information security program to create a holistic strategy focused on protecting the security of Stord's client's data, personnel, information systems, and information assets.
Use this portal to learn about our security posture and request access to our security documentation.
Compliance


Documents
SOC 2
SOC 3
Subprocessors
Risk Profile
Impact LevelModerate
Third Party DependenceYes
HostingMajor Cloud Provider
Product Security
Audit Logging
Data Security
Integrations
Reports
Network Diagram
Other Reports
Pentest Report
See more
Data Security
Access Monitoring
Backups Enabled
Data Erasure
See more
App Security
Code Analysis
Credential Management
Runtime Application Self Protection
See more
Legal
Subprocessors
Cyber Insurance
Data Processing Agreement
See more
Data Privacy
Cookies
Data Breach Notifications
Data Privacy Officer
See more
Access Control
Data Access
Logging
Password Security
Infrastructure
Endpoint Security
Disk Encryption
Endpoint Detection & Response
Mobile Device Management
See more
Network Security
Data Loss Prevention
Firewall
Spoofing Protection
See more
Corporate Security
Asset Management Practices
Email Protection
Employee Training
See more
Policies
Acceptable Use Policy
Access Control Policy
Anti-Malicious Software Policy
See more
Security Grades
ImmuniWeb
Stord
A
Qualys SSL Labs
Stord.com
A+
Stord OMS
A
Stord WMS
A+
Security Headers
Stord WMS
A