Trust Center

Start your security review
View & download sensitive information
Ask for information
ControlK

At Field Effect we recognize the important role that security and privacy play in our mission to strengthen the cybersecurity of organizations around the globe. Use this portal to learn more about our security posture and request access to our compliance documentation.

Telus-company-logoTelus
Intega IT-company-logoIntega IT
Intelligent Technical Solutions-company-logoIntelligent Technical Solutions
MSP Corp-company-logoMSP Corp
Mytech Partners-company-logoMytech Partners
Opti9-company-logoOpti9

Documents

Featured Documents

COMPLIANCECISA: Secure-by-Design Pledge
Trust Center Updates

Vulnerabilities

Copy link
Vulnerabilities

Field Effect is actively monitoring the recent supply chain attack involving hijacked npm packages. None of our services are affected, and our internal review confirms no exposure to the compromised components. Our onboarding process for third-party libraries includes validation steps that would have identified affected packages. Updates to third-party libraries are performed only after a review of their current security posture.

CMMC Customer Responsibility Matrix

Compliance

Field Effect has released Version 3.0 of our CMMC Customer Responsibility Matrix. In the new version control responsibilities related to the Field Effect MDR service are now mapped at the Assessment Objective (AO) level, providing more precise alignment with NIST SP 800-171 requirements.

Field Effect has released Version 2.0 of our CMMC Customer Responsibility Matrix, offering enhanced clarity on which NIST SP 800-171 controls are fully inherited by our MDR service.

Compliance

Field Effect has successfully completed a Service Organization Control (SOC) 2 Type 2 audit for Security, Availability, and Confidentially with no deviations noted by the auditors. This report is now available for download on our Trust Center.

This milestone confirms what our customers and partners already know: Field Effect’s security controls aren’t just designed—they’re operational, effective, and continuously evaluated against one of the most respected compliance frameworks in the industry.

If you need help using this Trust Center, please contact us.
Contact support
If you think you may have discovered a vulnerability, please send us a note.
Report issue