Qluster Trust Center
Security, compliance, and sub-processor information for prospects and customers.
Request accessLast updated May 15, 2026
Qluster is an AI-assisted platform for controlled review, approval, and release of recurring insurance reporting data — built for the commercial-insurance reporting workflows (including BDX) that brokers, MGAs, wholesalers, and capacity teams depend on. Founded in 2023.
Security, auditability, and human control are foundational to the product. Your data is encrypted, access-controlled, and never used to train AI models.
Compliance
SOC 2 Type I · Type II in progress.
Security controls
The categories of controls we operate across the business.
Access control
- Multi-factor authentication
- Role-based access control
- Access provisioning
- Access termination
- Periodic access reviews
Business continuity
- Backups
- Backup testing
- Contingency plan
- Capacity planning
Change management
- Code review
- Software development life cycle
- Configuration management
- Authorized software list
Incident response
- Incident response plan
- Incident reporting
- Incident response testing
Information security
- Information security policy
- Security leadership role
- Periodic self-assessments
Personnel security
- Background checks
- Security awareness training
- Access agreements and NDAs
System protection
- Encryption at rest and in transit
- Logging and monitoring
- Vulnerability management
- Network segmentation
- Penetration testing
Third-party risk
- Vendor reviews
- Third-party agreements
- Third-party risk management policy
Sub-processors
The third parties that may process customer data in support of the Qluster service.
AWS
Cloud infrastructure hosting
USA
Google Cloud Platform
Cloud infrastructure hosting
USA
Microsoft Azure
Cloud infrastructure hosting
USA
Anthropic
LLM provider for AI-assisted workflows
USA
OpenAI
LLM provider for AI-assisted workflows
USA
Google Workspace
Business productivity (email, docs, calendar)
USA
Documents
SOC 2 Type I report
Independent attestation of security controls
Security overview
Architecture and controls summary
Privacy Policy
How we handle personal data
Terms of Service
Terms governing use of the website
Sub-processor list
Third parties that process customer data
Need our security documentation?
Reach out and we'll route your request to the right person.
Contact us