Freyr Trust Center
At Freyr, trust is more than a promise - it is the foundation of everything we do. Our customers, employees, and partners rely on us to protect what matters most - their data. The Freyr Trust Portal is your gateway to understanding how we safeguard sensitive information and uphold the highest standards of security, privacy, and compliance.

Mechanisms
Access Control Procedures Established
Our access control policy defines requirements for three functions: adding new users (identity verification and access assignment), modifying users (updating information and access rights), and removing users (revoking access and deactivating credentials).
Access Revoked Upon Termination/Employee Exits
We complete termination checklists to ensure that access is revoked for departing employees within defined SLAs.
Production System Access Restricted
We ensure system access is restricted to authorized users only.
Production Application Access Restricted
We restrict privileged access to databases and other production workloads to authorized users with a legitimate business need.
Intrusion Detection System & Monitoring
We use cloud-native intrusion detection and endpoint detection and response (EDR) solutions to provide continuous monitoring of our network and early detection of potential security breaches, including protection for end-user devices.
Infrastructure Performance Monitored
We use infrastructure monitoring tools to track systems and performance and generate alerts when predefined thresholds are met.
Network and System Hardening Standards Maintained
Our network and system hardening standards are based on industry best practices and are reviewed at least annually.
Unique Account Authentication Enforced
We require users to authenticate to systems and applications using unique usernames and passwords; access to secret keys is strictly limited to authorized personnel.
Unique Network System Authentication Enforced
We segregate Production and lower environments (Dev, QA, SQA, Pre-Prod) and enforce unique authentication via role-based access control.
Application Security Configured
We use a web application firewall (WAF) to protect internet-facing applications and mitigate industry-recognized attacks and downtime.
Network Firewalls Reviewed
We review firewall rule sets at least annually.
Network Firewalls Utilized
We use firewalls configured to prevent unauthorized access.
Encryption Key Access Restricted
We restrict privileged access to encryption keys to authorized users with a business need.
Production Network Access Restricted
We restrict privileged access to the production network to authorized users with a business need.
Service Infrastructure Maintained
We ensure that infrastructure supporting the service is regularly patched as part of routine maintenance and in response to identified vulnerabilities, helping to harden servers against security threats.
Production OS Access Restricted
We restrict privileged access to the operating system to authorized users with a business need.
Firewall Access Restricted
We restrict privileged access to the firewall to authorized users with a business need.
User Access MFA Enforced
We enforce multi-factor authentication (MFA) on all user accounts.
Asset Disposal Procedures Utilized
We ensure that electronic media containing confidential information is purged or destroyed in accordance with industry best practices, with certificates of destruction maintained as evidence.
Production Inventory Maintained
At Freyr, we maintain a formal inventory of production system assets.
Portable Media Encrypted
We encrypt portable and removable media devices when used.
Anti-Malware Technology Utilized
We deploy anti-malware and EDR solutions on systems commonly susceptible to malicious attacks, and we configure them to update routinely, log activity, and be installed on all relevant systems.
Employee Background Checks Performed
We perform background checks on new employees.
Code of Conduct Acknowledged by Contractors
We require contractor agreements to include a code of conduct or a reference to the company code of conduct.
Code of Conduct Acknowledged by Employees and Enforced
We require employees to acknowledge a code of conduct at the time of hire. Employees who violate the code of conduct are subject to disciplinary action in accordance with our disciplinary policy.
Confidentiality Agreement Acknowledged by Contractors
We require contractors to sign a confidentiality agreement at the time of engagement.
Confidentiality Agreement Acknowledged by Employees
We require employees to sign a confidentiality agreement during onboarding.
Password Policy Enforced
We require passwords for in-scope system components to be configured according to company policy.
MDM System Utilized
At Freyr, we have a mobile device management (MDM) system in place to centrally manage mobile devices supporting the service.
Visitor Procedures Enforced
We require visitors to sign in, wear a visitor badge, and be escorted by an authorized employee when accessing the office or secure areas.
Security Awareness Training Implemented
We require employees to complete security awareness training as part of onboarding and at least annually thereafter.
Data Encryption Utilized
We safeguard both customer and internal data by adhering to industry best practices.
Control Self-Assessments Conducted
We conduct control self-assessments at least annually to ensure that controls are in place and functioning effectively. Corrective actions are implemented based on assessment findings and, where SLAs apply, completed within the agreed timeframe.
Penetration Testing Performed
Our penetration testing is performed at least annually. A remediation plan is developed, and changes are implemented to address vulnerabilities in accordance with SLAs.
MFA Support
We ensure the application supports multi-factor authentication (MFA), requiring additional factors beyond usernames and passwords.
SSO Integration Support
The application supports Single Sign-On (SSO) integration using Security Assertion Markup Language (SAML).
Data Encryption
We use secure data transmission protocols, such as TLS 1.2 or higher, to encrypt data transmitted over public networks. We also ensure encryption at rest is enabled to protect stored information.
Vulnerability and System Monitoring Procedures Established
Our formal policies define requirements for key IT and Engineering functions, including Vulnerability Management, System Monitoring, and a robust Software Development Life Cycle (SDLC) process.
Continuity and Disaster Recovery Plans Established
We ensure Business Continuity and Disaster Recovery Plans are in place, including defined communication strategies to maintain information security continuity in the event of key personnel unavailability.
Continuity and Disaster Recovery Plans Tested
At Freyr, we have an established and documented Business Continuity and Disaster Recovery (BC/DR) plan, which is tested at least annually to ensure its effectiveness.
Configuration Management System Established
At Freyr, we have a configuration management procedure in place to ensure that system configurations are deployed consistently throughout the environment.
Change Management Procedures Enforced
We ensure that all changes to software and infrastructure components are authorized, formally documented, tested, reviewed, and approved prior to deployment in the production environment.
Production Deployment Access Restricted
We restrict the ability to migrate changes to the production environment to authorized personnel only.
Development Lifecycle Established
We follow a formal Systems Development Life Cycle (SDLC) methodology that governs the development, acquisition, implementation, maintenance, and management of changes—including emergency changes—to information systems and related technology requirements.
SOC 2 – System Description
SOC 2 reports are maintained and reviewed for cloud vendors that provide infrastructure hosting, ensuring compliance with security, availability, and confidentiality requirements.
Whistleblower Policy Established
At Freyr, we have established a formal whistleblower policy, and an anonymous communication channel is in place for users to report potential issues or fraud concerns.
Board Meetings Conducted
Our Board of Directors meets at least annually, with formal meeting minutes maintained to document discussions and decisions.
Backup Processes Established
Our data backup policy outlines the requirements for the backup and recovery of customer data to ensure data integrity and availability.
System Changes Externally Communicated
We notify customers of critical system changes that may impact their processing, ensuring transparency and allowing for necessary adjustments.
Organization Structure Documented
At Freyr, we maintain an organizational chart that describes the organizational structure and reporting lines.
Roles and Responsibilities Specified
Roles and responsibilities for the design, development, implementation, operation, maintenance, and monitoring of information security controls are formally assigned through job descriptions and/or documented in the Roles and Responsibilities policy.
Security Policies Established and Reviewed
Our information security policies and procedures are documented and reviewed at least annually.
Support System Available
At Freyr, we maintain an external-facing support system that enables users to report system failures, incidents, concerns, and other complaints to the appropriate personnel or teams.
System Changes Communicated
We communicate system changes to authorized internal users.
Access Reviews Conducted
We conduct periodic access reviews for in-scope system components to ensure access is appropriately restricted, with required changes tracked through to completion.
Access Requests Required
We ensure that user access to in-scope system components is granted based on job role and function, or via a documented access request with manager approval prior to provisioning.
Incident Response Policies Established
At Freyr, we have security and privacy incident response policies and procedures that are documented and communicated to authorized users.
Incident Management Procedures Followed
Security and privacy incidents are logged, tracked, resolved, and communicated to affected or relevant parties by management according to the company’s security incident response policy and procedures.
Physical Access Processes Established
At Freyr, we have established processes for granting, modifying, and revoking physical access to company data centers, based on authorization from designated control owners.
Company Commitments Externally Communicated
Our security commitments are communicated to customers as needed, ensuring transparency and alignment with customer expectations.
External Support Resources Available
At Freyr, we provide customers with guidelines and technical support resources to assist with system operations.
Service Description Communicated
At Freyr, we provide clear and concise descriptions of our products and services to inform and engage both internal stakeholders and external audiences.
Risk Assessments Performed
We conduct annual risk assessments to identify and evaluate threats—including environmental, regulatory, technological, and fraud-related risks—that may impact our service commitments and objectives.
Risk Management Program Established
At Freyr, we maintain a documented risk management program that outlines the identification of potential threats, risk significance ratings, and corresponding mitigation strategies.
Third-Party Agreements Established
At Freyr, we maintain written agreements with vendors and third parties that include confidentiality and privacy commitments specific to each entity.
Vendor Management Program Established
At Freyr, we have a vendor management program that includes defined security and privacy requirements and mandates annual reviews of critical third-party vendors.
Vulnerabilities Scanned and Remediated
We perform host-based vulnerability scans in real time using cloud-native services, with critical and high-severity vulnerabilities tracked through to remediation.
Data Retention Procedures Established
At Freyr, we have formal procedures in place to ensure the secure retention and disposal of both company and customer data.
Customer Data Deleted Upon Leaving
We securely purge customer data containing confidential information from the application environment upon service termination, following defined processes and industry best practices.





