Trust & Security
Built for boards that can’t compromise on compliance.
From SOC 2 controls to advanced approvals, Stride keeps board material, OKRs, and decisions secure—no extra portals or email attachments.
SOC 2 Type II controls
Independent auditors monitor change management, access reviews, and incident response. We share the latest bridge letter with every Enterprise evaluation.
Encryption everywhere
Stride encrypts data in transit via TLS 1.2+ and at rest using AES-256. Secrets live in managed vaults with rotation policies.
Role-based governance
Granular roles cover board chairs, execs, observers, and external counsel. Every approval, agenda edit, and document export is audited.
Single Sign-On
SAML/SCIM support lets IT manage lifecycle, enforce MFA, and connect to Okta, Azure AD, or Google Workspace out of the box.
Regional hosting
EU and US regions ensure data residency compliance. Backups stay within the same geography and replicate across zones.
Compliance playbook
We provide DPAs, subprocessor lists, penetration test summaries, and security questionnaires within one business day.
Process
Security review in three steps
- 1. Share requirements. Send your questionnaire or compliance checklist to security@stride.app.
- 2. Review artifacts. We provide SOC 2 report, DPA, pen-test summaries, and subprocessor list within one business day.
- 3. Align on rollout. Our solutions engineer co-develops admin policies, retention settings, and testing timelines.