What’s in This Section
Security Posture
Root’s secure development practices, vulnerability disclosure policy, and infrastructure security.
Certifications & Attestations
SOC 2, and other compliance certifications with audit report access.
Trust Center
Sub-processors, data residency, and security FAQ for procurement reviews.
Compliance Use Cases
Vulnerability Management SLA
Many compliance frameworks (SOC 2, PCI-DSS, FedRAMP) require that vulnerabilities be remediated within defined time windows. Root’s SLA-backed remediation provides the documented evidence auditors need:| Severity | Root SLA | Typical Requirement |
|---|---|---|
| Critical | 7 days | 30 days (PCI-DSS 4.0) |
| High | 14 days | 30–60 days |
| Medium | 60 days | 90 days |