Security Posture Overview
Governance, access, data handling, incident response, and third-party risk — authored against the Stackbilder CISO Harness template.
CISO · Trust Bundle
The Stackbilder CISO Harness generates a signed security posture bundle in minutes. Cryptographically verifiable by any enterprise buyer. Hosted at trust.stackbilder.com/<your-slug>. When controls change, re-run the harness — a new signed receipt, same page.
Invite-only while we calibrate the harness · signing infrastructure live 2026-04-18 · verifier advisory window through 2026-05-18
§ What you get
Governance, access, data handling, incident response, and third-party risk — authored against the Stackbilder CISO Harness template.
Decomposition of your primary data plane. Threats identified, mitigated or accepted with rationale. DFD + attack trees.
Canonical DFD with trust-boundary crossings annotated. Classification matrix (Public / Internal / Confidential / Restricted) mapped to handling rules.
Roles, severity ladder, communication tree, and notification SLAs. Signable by the engineering lead.
Control ownership split between you and your customers across identity, data, infrastructure, endpoint, and incident response.
Current subprocessors with purpose, data categories, and region. Machine-readable JSON for procurement automation.
CAIQ-Lite v4, pre-answered. Procurement teams can import directly into Vanta Trust or Drata.
A public page at trust.stackbilder.com/<your-slug> rendering the signed receipt and the bundle. Regenerated whenever your controls change.
Bundle generation and hosted page are both shipping. Per-artifact preview/download for the seven documents is rolling out during early access.
§ How it's different
Every claim — "universal MFA: enforced," "TLSv1.2+," "90-day log retention" — is bound into an HMAC-SHA256 signature over a canonical encoding. Edit one character and the signature breaks. You cannot quietly walk a claim back.
Your buyer's security team can hit verify.stackbilt.dev/<hash> directly and recompute the signature themselves. No login. No portal. No trust-me. 404 on unknown hashes with no existence leak.
Controls change — new subprocessor, tightened IR plan, rotated keys. Re-run the harness, sign a new receipt, publish it to the same Trust Page. Prior receipts remain verifiable for historical record.
§ Pricing
One-time
Bundle required
Trust Bundle is invite-only while we iterate on the harness. Request an invite above; we'll open purchase when the calibration window closes and the invite allowlist ships.
FAQ