Trust Center Essentials: The 9 Pages Every B2B SaaS Needs to Publish
The exact pages and artifacts to publish on your trust center: security overview, compliance attestations, subprocessors, DPA, SLA, incident history, penetration testing summary, and access request workflow. With a content checklist.
TL;DR
- A well-built trust center cuts 2–5 days off every enterprise procurement cycle and ranks for "[Your Brand] security" queries.
- 9 essential pages: Overview, Compliance, Security, Subprocessors, DPA, SLA, Incident history, Pentest summary, Access request.
- Native pages on your domain (vs third-party platform) work for most SaaS and rank better in search.
When an enterprise security analyst opens your sales email at 4:30 PM on a Thursday, they have 90 seconds to decide whether your SaaS is worth a full security review. What they want: a scannable page showing your current SOC 2 status, ISO 27001 certificate, DPA terms, and subprocessor list. What they usually find: a generic "contact sales" page or an outdated PDF.
A well-built trust center solves this. It compresses the first-pass procurement review from 45 minutes of back-and-forth email into 5 minutes of self-service. Teams that invest in trust center content close enterprise deals 2 to 5 business days faster than teams that rely on sales-led artifact delivery.
This guide covers the nine pages every enterprise-ready trust center needs, what each page contains, and a content checklist you can implement this quarter.
Why a Trust Center Accelerates Deals
Enterprise procurement cycles have three distinct phases: initial vendor risk evaluation (days 1–5), deep security review (days 5–20), and contract negotiation (days 15–45). A trust center accelerates phase one.
During initial evaluation, a security analyst wants to answer five questions:
- What compliance attestations does this vendor hold and are they current?
- Where does this vendor store and process data?
- What are the vendor's subprocessors and does the list align with our internal policies?
- What does the vendor's DPA look like?
- Has this vendor had any security incidents we should know about?
If your trust center answers all five questions without the analyst having to email your sales team, you move to phase two immediately. If the analyst has to email sales, you lose 2 to 5 business days in asynchronous back-and-forth.
For the broader strategy of building trust centers that close enterprise deals, see our trust center deep-dive.
The 9 Essential Pages
1. Trust Center Overview (/trust or /security)
The landing page. Should be scannable in 60 seconds and answer the top-level "what compliance does this vendor have?" question.
Must include:
- Compliance attestation summary table (framework, type, current through date, link to report request)
- Primary data processing locations
- Links to each detailed page
- Request mechanism for gated artifacts (SOC 2 Type II report, pentest report)
- Current status indicator (systems operational / degraded / incident)
Good to include:
- Security and privacy team contact
- Vulnerability disclosure program link
- Trust center update log (last 5 changes)
2. Compliance Attestations (/trust/compliance)
Detailed view of each attestation.
Must include:
- SOC 2 Type II: report coverage period, Trust Service Criteria covered, auditor name, bridge letter if applicable
- ISO 27001 (if applicable): certificate number, certification body, scope, expiration date
- GDPR compliance statement and DPA link
- HIPAA status (if healthcare)
- PCI DSS status (if handling cardholder data)
- Any regional attestations (FedRAMP, TISAX, C5, etc.)
Good to include:
- Next audit or certification cycle date
- Links to full reports (gated or public)
- Historical attestations (archive)
For SOC 2 specifically, see our SOC 2 readiness guide.
3. Security Practices (/trust/security)
Narrative overview of security controls. This is the page enterprise security teams read line-by-line.
Must include:
- Encryption at rest and in transit (specifics: AES-256, TLS 1.3)
- Access controls (SSO, MFA, least-privilege, access reviews)
- Network security (VPC architecture, WAF, DDoS protection)
- Application security (SDLC, code review, SAST, DAST, dependency scanning)
- Infrastructure (cloud provider, region strategy, high availability)
- Monitoring and logging (SIEM, log retention, alerting)
- Incident response (team structure, notification windows)
- Vulnerability management (scanning cadence, patching SLA)
- Data backup and disaster recovery (RTO, RPO targets)
Format tip: Structure as a long-form page with clear H2s for each topic. Security analysts Ctrl-F for specific terms — explicit headings help them find answers fast.
4. Subprocessors (/trust/subprocessors)
The current list of third-party vendors that process personal data on your behalf.
Must include:
- Subprocessor legal name
- Service provided
- Country of processing
- Categories of data processed
- Date added
- DPA status and security attestations
Good to include:
- Subscription mechanism for change notifications
- Historical changes archive
- Links to each subprocessor's trust center or security page
For the complete subprocessor list methodology, see our subprocessor list best practices guide.
5. Data Processing Agreement (/trust/dpa)
Your DPA template and execution process.
Must include:
- Link to downloadable DPA template (PDF or DOCX)
- DPA version and effective date
- Contact for DPA negotiation and execution
- Reference to 2021 EU Standard Contractual Clauses (or equivalent for non-EU transfers)
- Summary of key terms (liability cap, subprocessor notification, audit rights, breach notification)
Good to include:
- Pre-signed DPA option for customers that accept your template
- FAQ covering common negotiation requests
- Flow-down language for customers' subprocessor notification to their end users
For DPA content requirements, see our Article 28 DPA guide.
6. Service Level Agreement (/trust/sla)
Your uptime commitment and incident credits.
Must include:
- Uptime target (99.9%, 99.95%, 99.99%)
- Measurement methodology (which systems count, how downtime is measured)
- Scheduled maintenance windows and exclusions
- Service credit structure for SLA breaches
- Reporting mechanism for customers to claim credits
Good to include:
- Historical uptime (last 12 months)
- Status page link
- Incident response time commitments
7. Incident History and Status (/trust/incidents or link to status page)
Transparency about past incidents builds credibility faster than any marketing claim.
Must include:
- Status page (real-time system health)
- Incident history (major incidents from the last 12 to 24 months)
- For each incident: date, duration, services affected, customer impact, root cause, corrective action
Good to include:
- RSS feed for incident notifications
- Email subscription for status page updates
- Post-mortem publication for major incidents
Enterprise buyers trust vendors who publish their incidents. A clean status page with zero incidents is less trustworthy than a status page with documented and well-handled incidents.
8. Penetration Testing (/trust/pentest)
Summary of your most recent penetration test engagement.
Must include:
- Pentest firm name (if publishable)
- Date of most recent test
- Scope (external network, web application, API, mobile)
- Methodology (OWASP, NIST, PTES)
- Summary of findings (count by severity, status of remediation)
Good to include:
- Request form for full pentest report (NDA-gated)
- Pentest cadence commitment (annual, after major releases, etc.)
- References to specific vulnerabilities discovered and closed
For pentest planning detail, see our SOC 2 and ISO 27001 pentest guide.
9. Artifact Request (/trust/request or embedded on overview)
The mechanism enterprise buyers use to access gated artifacts.
Must include:
- Form fields: requester name, company, email, role, artifact requested, reason for request
- NDA handling (auto-generated NDA for standard artifacts, or custom NDA for sensitive content)
- SLA for response (within 24 hours is table stakes; within 1 hour is a competitive advantage)
- Requested artifact delivery mechanism (secure download link, DocSend, Google Drive with permissions)
Good to include:
- Artifact self-service for customers (logged-in access to artifacts without repeated NDA)
- Usage tracking (which customers have accessed which artifacts)
- Watermarking for sensitive artifacts
Trust Center Platforms vs Native Pages
Several vendors offer trust center platforms: Vanta Trust, Drata Trust, SafeBase, Scrut, Conveyor. Each has tradeoffs.
Platform strengths:
- Pre-built NDA workflow and artifact gating
- Integration with GRC platform (automatic status sync)
- Professional-looking templates
- Request tracking and analytics
Platform limitations:
- Hosted on vendor subdomain (e.g.,
yourcompany.trust.vanta.com), which does not benefit your domain SEO - Monthly subscription cost ($6,000–$24,000/year typically)
- Less flexibility for unique content or branding
- Migration effort if you change platforms
Native pages strengths:
- Ranks under your domain for "[Your Brand] security" and "[Your Brand] SOC 2" queries
- Full design control
- Zero recurring cost
- Deep SEO benefit for adjacent compliance queries
Native pages limitations:
- Build and maintain overhead (typically 1–3 weeks initial build plus quarterly updates)
- NDA workflow requires custom integration or manual handling
- Analytics require separate setup
Recommendation: Native pages for most B2B SaaS doing fewer than 50 enterprise deals per year. Platform for enterprise-scale SaaS or teams that want to invest the trust center budget into distribution rather than maintenance.
Content Checklist
Use this as a content specification for your first trust center build.
Overview page
- Compliance summary table
- Data processing locations
- Links to all detail pages
- Artifact request mechanism
- Status indicator
- Security and privacy contact
Compliance page
- Each attestation with coverage and expiration
- Auditor/certification body names
- Next audit cycle dates
- Full reports (gated or public)
Security page
- Encryption specifics
- Access controls detail
- Network architecture overview
- Application security practices
- Cloud provider and regions
- Monitoring and logging
- Incident response
- Vulnerability management
- Backup and DR with RTO/RPO
Subprocessors page
- All current subprocessors
- Mandatory fields (name, service, country, data categories)
- Change subscription mechanism
- Historical changes archive
DPA page
- Downloadable template
- Version and effective date
- Execution contact
- Summary of key terms
SLA page
- Uptime commitment
- Measurement methodology
- Credits structure
- Historical uptime
Incident page
- Status page (current health)
- Incident history
- Post-mortem publications
Pentest page
- Firm name and date
- Scope
- Methodology
- Findings summary
Request page
- Form fields
- NDA workflow
- Response SLA
- Delivery mechanism
Update Cadence
Assign specific owners and cadences for each page.
| Page | Update trigger | Typical cadence |
|---|---|---|
| Overview | Attestation status change | As needed + quarterly |
| Compliance | New audit cycle | Annually + as needed |
| Security | Architecture or control changes | Quarterly review |
| Subprocessors | Any subprocessor change | 24–48 hours |
| DPA | Legal/regulatory change | Annually + as needed |
| SLA | SLA commitment change | Annually |
| Incidents | Any incident meeting notification threshold | Within 2 business days |
| Pentest | Completion of engagement | Annually |
| Request page | Form fields or SLA change | Quarterly review |
Common Mistakes
Gating the overview page behind an NDA. Customers cannot evaluate whether to proceed if the top-level information is gated. Make the overview public.
Outdated SOC 2 report dates. A trust center showing a SOC 2 report that ended 14 months ago costs you enterprise deals. Re-issue reports or publish bridge letters within the valid window. See our bridge letter guide.
Vague security claims. "Enterprise-grade security" is marketing. "AES-256 encryption at rest with keys managed by AWS KMS; TLS 1.3 in transit; quarterly key rotation" is security.
No incident history. Zero incident history signals either immaturity (you are not mature enough to have experienced one) or opacity (you are hiding them). Publish and manage incidents transparently.
Missing status page. Status page is table stakes. Statuspage.io, Instatus, or self-hosted all work.
Subprocessor list drift. Public list outdated vs actual subprocessors creates contractual and regulatory risk. Automate updates.
No request tracking. Sales and security teams duplicate requests without visibility. Build a shared tracking system (even a simple shared spreadsheet with request status).
Getting Started
If you do not have a trust center, publish the overview page and compliance page this quarter. The other seven pages can roll out over the following 60 days. Every page you publish is infrastructure for every future enterprise deal.
For teams that want a trust center designed, built, and operationalized as part of a broader compliance program — with content, NDA workflows, artifact generation, and update cadence all handled — CertifyOps delivers trust center programs built for enterprise procurement.
Free SOC 2 Readiness Checklist
A step-by-step checklist covering every control family, evidence requirement, and common audit finding. Used by 50+ SaaS teams preparing for their first SOC 2 audit.