top of page
  • LinkedIn
  • Youtube

CG Infinity
Trust Center

CG Infinity is committed to ensuring the confidentiality, integrity, and availability of of your data. Here is how we protect information and comply with industry standards and regulations.

Resources

Working with Financial Documents

SOC2 Type I Report

Our SOC 2 Type I report provides an independent assessment of the design and implementation of CG Infinity’s security controls as of a specific point in time. It evaluates how our systems and processes align with the AICPA’s Trust Services Criteria for Security, Availability, and Confidentiality.

Reviewing Reports at Desk

SOC2 Type II Report

Type II goes one step further: it evaluates the operational effectiveness of those controls over a defined period (typically 3–12 months). We are actively undergoing preparation for our SOC 2 Type II audit, expected in the first quarter of 2026

Computer Chip

Privacy Policy

A Privacy Policy is a legal document that explains how a company collects, uses, stores, and protects users' personal data. It typically includes details about data collection methods, third-party sharing, user rights, and security measures in place to safeguard information.

Credit Assessment_2

Terms of Use

Terms of Use is a legal agreement that outlines the rules, responsibilities, and restrictions for using a company's website, app, or service. It typically covers user rights, acceptable usage, intellectual property, disclaimers, limitations of liability, and termination policies.

Sub-Processors

1.png

Microsoft

Office365

Azure Hosting Services

Data Location

USA

Monitoring features

Change Management

Configuration and Asset Management Policy
Production Data Use is Restricted
Secure Development Policy
Change Management Policy

Availability

Testing the Business Continuity and Disaster Recovery Plan

Business Continuity and Disaster Recovery Policy

Organizational Management

Roles and Responsibilities

Cybersecurity Insurance

 Security Awareness Training

Internal Control Policy

Confidentiality

Data Retention and Disposal Policy

Data Classification Policy

Vulnerablity Management

Vulnerability and Patch Management Policy

Incident Response

 Incident Response Plan

Security & Compliance Roadmap

Quarter
Milestone
Status
Q4 2025
SOC 2 Type I Audit
✅ Completed
Q1 2026
Annual Penetration Test
🔄 In Progress
Q1 2026
SOC 2 Type II Certification
🗓️ Scheduled
Ongoing
Continuous Vulnerability Management
🟢 Active
bottom of page