Restricted Documents Library

Our Documents Library provides direct access to key security, privacy, and compliance materials for Cetbix customers and prospects. Below you’ll find the restricted documents, which you can request via a secure access form.

Restricted Documents (Request Access)

These highly sensitive or internal‑facing documents are protected and only shared on a need‑to‑know basis. You can request access via a secure form, and approvals are logged and governed by Cetbix security policy.

Penetration test executive summary
A non‑technical summary of results from recent penetration tests of the Cetbix platform and products. This document highlights key findings, remediation status, and how we continuously improve security based on independent testing.

Business continuity plan summary
A high‑level summary of Cetbix’s business‑continuity and disaster‑recovery capabilities, including RTO/RPO targets, backup strategies, and failover procedures for platform services.

Security policies
Non‑exhaustive excerpts or summaries of Cetbix internal security policies (e.g., access control, incident management, cryptography, and change control). These documents help you understand how security is governed across the organisation.

Risk management summary
A consolidated view of how Cetbix identifies, assesses, and treats information‑security risks. This document explains the risk‑management methodology, risk‑treatment approach, and how customer data is factored into our risk profile.

Audit reports (e.g., SOC, ISO internal audits)
High‑level audit reports and internal audit summaries that demonstrate control effectiveness across the ISMS and platform. These materials are intended for customers and partners who require deeper assurance evidence.

How to request restricted documents

  1. Click “Request access” next to the document you need.
  2. Fill in a short form (company name, contact details, products used, requested document, and justification).
  3. Our security/compliance team will review your request and grant access via a secure, time‑limited portal link where applicable.
  4. All access requests and approvals are logged for audit and governance purposes.

You may also add a note such as:

“Restricted documents are intended for current customers and qualified prospects. They may be updated periodically and are subject to confidentiality obligations.”