Veritus Trust Center
At Veritus, security is foundational. In consumer lending, protecting sensitive financial data isn't optional. It's the baseline. We build around the core principles of confidentiality, integrity, and availability. Data must be protected from unauthorized access, accurate, and accessible when our customers need it. These principles shape every decision we make, from infrastructure to policy.
Compliance
Resources
Veritus - 2025 SOC 2 Type 2 Report Final
AIS - Veritus Agent - EU AI Act - 20260130 - v1.0 - signed cert
ISO 27001 Certificate
PCI DSS Document
Personnel Security Policy
Controls
ePHI policy accessibility evidence
Access restricted to modify infrastructure
Remote access tool
Access control procedures
Access review of infrastructure
Encryption of data
Database backups
Privacy and confidentiality governance charter
ePHI data sanitization
Backup and recovery policy
Source code tool
Vulnerability scanning
Business continuity and disaster recovery testing
Web application firewall
Sample code changes
SSL/TLS certificates for infrastructure
Intrusion detection tool
Infrastructure baseline hardening policy
Monitoring, measurement, analysis and evaluation
Monitoring tool
Security incident list
Alerts and remediation
Breach notification communication
Incident response and breach notification policy
Whistleblower policy
Log management tool
ePHI risk assessment report
Vendor management program
Vendor termination
Vendor list
Vendor onboarding
GDPR alignment
Media disposal training
New employee and contractor agreements
List of newly hired employees & contractors
Existing employee and contractor agreements
Employee handbook
Multi-availability zones
Asset register maintaining
AI System Architecture
General Purpose AI transparency
Risk and Governance Executive Committee meeting minutes
Risk management program
Key management services used
Mobile device management tool configurations
Ticketing tool
Security-related roles
Termination checklist