Security & Compliance at PostSig

Designed for trust. Documented in full.

PostSig is built to protect your business content and documents with enterprise-grade security controls.

Documents are the starting point for PostSig’s Contract Performance Management platform. Our security program ensures that this content is protected, accessed, and processed in a controlled and auditable manner throughout its lifecycle.

For detailed technical and policy documentation, download our Security & Compliance Overview.

PostSig is built to protect your business content and documents with enterprise-grade security controls.

Documents are the starting point for PostSig’s Contract Performance Management platform. Our security program ensures that this content is protected, accessed, and processed in a controlled and auditable manner throughout its lifecycle.

For detailed technical and policy documentation, download our Security & Compliance Overview.

Built with Enterprise Security Standards

Our Security Approach

Our Security Approach

Our Security Approach

Security at PostSig is guided by a simple principle: customer content should be protected, isolated, and controlled at all times.

We apply layered security practices across identity and access management, data isolation, infrastructure security, and operational monitoring to support this goal.


Security at PostSig is guided by a simple principle: customer content should be protected, isolated, and controlled at all times.

We apply layered security practices across identity and access management, data isolation, infrastructure security, and operational monitoring to support this goal.


SOC 2
Alignment

SOC 2
Alignment

SOC 2
Alignment

PostSig’s architecture and operational practices are designed to align with SOC 2 Type II security controls.

We are currently in our SOC 2 Type II observation period, with the audit conducted by Prescient Assurance. The final report is expected by March 2026 and will be available to customers under NDA.


PostSig’s architecture and operational practices are designed to align with SOC 2 Type II security controls.


We are currently in our SOC 2 Type II observation period, with the audit conducted by Prescient Assurance. The final report is expected by March 2026 and will be available to customers under NDA.

How We Protect Customer Content

PostSig is designed to ensure that customer documents and business content are:

  • Accessible only to authorized users

  • Logically isolated between customer environments

  • Protected through secure storage and controlled processing

  • Monitored to support detection and response to security events

Ownership of customer content always remains with the customer.

PostSig is designed to ensure that customer documents and business content are:

  • Accessible only to authorized users

  • Logically isolated between customer environments

  • Protected through secure storage and controlled processing

  • Monitored to support detection and response to security events

Ownership of customer content always remains with the customer.

Incident Awareness & Response

PostSig maintains defined procedures for monitoring, detecting, and responding to security events.

When a confirmed security incident affects customer data, established processes guide investigation, remediation, and customer communication.

PostSig maintains defined procedures for monitoring, detecting, and responding to security events.


When a confirmed security incident affects customer data, established processes guide investigation, remediation, and customer communication.

Transparency & Assurance

PostSig supports customer security reviews and due-diligence processes.

Additional documentation, including detailed security controls and our SOC 2 report upon completion, is available upon request.

Privacy & Data Protection

PostSig applies data protection practices designed to support customer obligations under applicable privacy regulations, including the GDPR. A Data Processing Addendum (DPA) is available upon request, and customer data is processed in accordance with our Privacy Policy.

For security-related inquiries:

security@postsig.com


PostSig supports customer security reviews and due-diligence processes.

Additional documentation, including detailed security controls and our SOC 2 report upon completion, is available upon request.

Privacy & Data Protection

PostSig applies data protection practices designed to support customer obligations under applicable privacy regulations, including the GDPR. A Data Processing Addendum (DPA) is available upon request, and customer data is processed in accordance with our Privacy Policy.

For security-related inquiries:

security@postsig.com


See PostSig in Action

Join leading hedge funds, private equity firms, and financial institutions using PostSig to transform contract operations—across legal, finance, and compliance.